Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14798 (GCVE-0-2020-14798)
Vulnerability from cvelistv5
- Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data.
Vendor | Product | Version | ||
---|---|---|---|---|
Oracle Corporation | Java SE JDK and JRE |
Version: Java SE: 7u271 Version: 8u261 Version: 11.0.8 Version: 15; Java SE Embedded: 8u261 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:00:50.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "name": "DSA-4779", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4779" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "name": "openSUSE-SU-2020:1893", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "name": "GLSA-202101-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202101-19" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-14798", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T19:44:17.079782Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T20:21:17.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Java SE JDK and JRE", "vendor": "Oracle Corporation", "versions": [ { "status": "affected", "version": "Java SE: 7u271" }, { "status": "affected", "version": "8u261" }, { "status": "affected", "version": "11.0.8" }, { "status": "affected", "version": "15; Java SE Embedded: 8u261" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-25T02:06:10", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "name": "DSA-4779", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4779" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "name": "openSUSE-SU-2020:1893", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "name": "GLSA-202101-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202101-19" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2020-14798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java SE JDK and JRE", "version": { "version_data": [ { "version_affected": "=", "version_value": "Java SE: 7u271" }, { "version_affected": "=", "version_value": "8u261" }, { "version_affected": "=", "version_value": "11.0.8" }, { "version_affected": "=", "version_value": "15; Java SE Embedded: 8u261" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)." } ] }, "impact": { "cvss": { "baseScore": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20201023-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "name": "DSA-4779", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4779" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "name": "openSUSE-SU-2020:1893", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "name": "GLSA-202101-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-19" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2020-14798", "datePublished": "2020-10-21T14:04:25", "dateReserved": "2020-06-19T00:00:00", "dateUpdated": "2024-09-26T20:21:17.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-14798\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2020-10-21T15:15:19.780\",\"lastModified\":\"2025-05-27T16:43:05.320\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto Java SE, Java SE Embedded de Oracle Java SE (componente: Libraries).\u0026#xa0;Las versiones compatibles que est\u00e1n afectadas son Java SE: 7u271, 8u261, 11.0.8 y 15;\u0026#xa0;Java SE integrado: 8u261.\u0026#xa0;Una vulnerabilidad dif\u00edcil de explotar permite a un atacante no autenticado con acceso a la red por medio de m\u00faltiples protocolos comprometer a Java SE, Java SE Embedded.\u0026#xa0;Los ataques con \u00e9xito requieren la interacci\u00f3n humana de una persona diferente del atacante.\u0026#xa0;Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Java SE, Java SE Embedded.\u0026#xa0;Nota: Esta vulnerabilidad aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets de Java en sandbox, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y conf\u00edan en el sandbox de Java para su seguridad.\u0026#xa0;Esta vulnerabilidad no aplica a las implementaciones de Java, generalmente en servidores, que cargan y ejecutan solo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador).\u0026#xa0;CVSS 3.1 Puntuaci\u00f3n Base 3.1 (Impactos de la Integridad).\u0026#xa0;Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"02011EDC-20A7-4A16-A592-7C76E0037997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6D4652-1226-4C60-BEDF-01EBF8AC0849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1F9ED7-7D93-41F4-9130-15BA734420AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF9CDF1-95D3-4125-A73F-396D2280FC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28388AB-CFC9-4749-A90F-383F5B905EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7AD457-6CE6-4925-8D94-A907B40233D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480E5AD-DB46-474A-9B57-84ED088A75FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"881A4AE9-6012-4E91-98BE-0A352CC20703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E1079-57D9-473B-A017-964F4745F329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D6446E-2915-4F12-87BE-E7420BC2626E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"564EDCE3-16E6-401D-8A43-032D1F8875E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"08278802-D31B-488A-BA6A-EBC816DF883A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBB0969-565E-43E2-B067-A10AAA5F1958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78BE95D-6270-469A-8035-FCDDB398F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C24F40-3150-4584-93D9-8307DE04EEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"19626B36-62FC-4497-A2E1-7D6CD9839B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"5713AEBD-35F6-44E8-A0CC-A42830D7AE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE0C04B-440E-4B35-ACC8-6264514F764C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"555EC2A6-0475-48ED-AE0C-B306714A9333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C55E2E-AEDE-455C-B128-168C918B5D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"81831D37-6597-441B-87DE-38F7191BEA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"70892D06-6E75-4425-BBF0-4B684EC62A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"67ED8559-C348-4932-B7CE-CB96976A30EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC3D91-263F-4345-9FAA-0E573EA64590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B2F24-A730-4818-90C8-A2D90C081F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"464087F2-C285-4574-957E-CE0663F07DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\",\"matchCriteriaId\":\"083419F8-FDDF-4E36-88F8-857DB317C1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\",\"matchCriteriaId\":\"07812576-3C35-404C-A7D7-9BE9E3D76E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C52B1C-5447-4282-9667-9EBE0720B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE30779-48FB-451E-8CE1-F469F93B8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\",\"matchCriteriaId\":\"60590FDE-7156-4314-A012-AA38BD2ADDC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24F6122-2256-41B6-9033-794C6424ED99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D6F19F-59B5-4BB6-AD35-013384025970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\",\"matchCriteriaId\":\"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB74086-14B8-4237-8357-E0C6B5BB8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\",\"matchCriteriaId\":\"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3F367-33AD-47C3-BFDC-871A17E72C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"78261932-7373-4F16-91E0-1A72ADBEBC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A40B8A-D428-4008-9F21-AF21394C51D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465CFA59-8E94-415A-ACF0-E678826813BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85BDC28A-484B-4D14-8D68-890450DCE3F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"635DEFDD-4840-48C6-AB1C-ADAFF4A1E50C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A221DB-1684-4C87-B576-0969FE13E1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE6A1B86-3688-4A13-AB37-DBD0DA323202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E0085B-4748-4F79-BEF6-CD9C3D2E6FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4DAA76-EAA9-4C85-A92A-181EA49F3270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19FC2907-1712-4E81-AC35-E3A15BF27606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:11.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140F8ECC-F5DB-474E-ADA4-99EC9FBA45EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD3A4AFB-8D76-4B16-A306-2A10F23E51EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1704C904-6E0A-4972-BC94-326D8BC6315A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:13.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35FA24D1-8BDA-4DD4-A74C-C041C44A1455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:13.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"790FD30A-CE27-4A1E-A753-BE0A6B17B262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:13.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"254B5086-305E-4A19-8845-02BF7B8AA3F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65118341-0005-405D-B688-A3D98FD97A76\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D07DCC8-4D24-4B8F-B72E-83DC311BD683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC508A2-CF8A-4037-87C8-B87E19ABC644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F90A96-7F92-4DB8-9B76-BA558FDF9BBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3917541-7ACF-4033-86EC-DB54938DBF41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD023425-3457-4ABC-B1CF-9BA2F68924F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"240E3859-040C-4E94-806C-E40E9E2C5EA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:11.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB90BAC0-EC64-48BF-9B22-41F5B540AB04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4806C163-0E76-49C3-BE42-F90E4B451051\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"7.3\",\"matchCriteriaId\":\"BD075607-09B7-493E-8611-66D041FFDA62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.5\",\"matchCriteriaId\":\"0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.60.1\",\"matchCriteriaId\":\"AFA6AD29-34C2-4FEC-9585-C42C6615C6CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9CC59D-6182-4B5E-96B5-226FCD343916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F148EC-6D6D-4C4F-B57C-CFBCD3D32B41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18CA4B5-28FD-4199-B1F0-B1E59E920370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB15BCF1-1B1D-49D8-9B76-46DCB10044DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A372B177-F740-4655-865C-31777A6E140B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"25BBBC1A-228F-45A6-AE95-DB915EDF84BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*\",\"matchCriteriaId\":\"C57D2B31-9696-4451-BA04-D093FFCF7E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02DEB4FB-A21D-4CB1-B522-EEE5093E8521\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B009C22E-30A4-4288-BCF6-C3E81DEAF45A\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202101-19\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201023-0004/\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4779\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202101-19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20201023-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4779\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"affected\": [{\"product\": \"Java SE JDK and JRE\", \"vendor\": \"Oracle Corporation\", \"versions\": [{\"status\": \"affected\", \"version\": \"Java SE: 7u271\"}, {\"status\": \"affected\", \"version\": \"8u261\"}, {\"status\": \"affected\", \"version\": \"11.0.8\"}, {\"status\": \"affected\", \"version\": \"15; Java SE Embedded: 8u261\"}]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 3.1, \"baseSeverity\": \"LOW\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\", \"version\": \"3.1\"}}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data.\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2021-01-25T02:06:10\", \"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\"}, \"references\": [{\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.netapp.com/advisory/ntap-20201023-0004/\"}, {\"name\": \"DSA-4779\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"], \"url\": \"https://www.debian.org/security/2020/dsa-4779\"}, {\"name\": \"[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html\"}, {\"name\": \"openSUSE-SU-2020:1893\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html\"}, {\"name\": \"GLSA-202101-19\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"], \"url\": \"https://security.gentoo.org/glsa/202101-19\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"secalert_us@oracle.com\", \"ID\": \"CVE-2020-14798\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"Java SE JDK and JRE\", \"version\": {\"version_data\": [{\"version_affected\": \"=\", \"version_value\": \"Java SE: 7u271\"}, {\"version_affected\": \"=\", \"version_value\": \"8u261\"}, {\"version_affected\": \"=\", \"version_value\": \"11.0.8\"}, {\"version_affected\": \"=\", \"version_value\": \"15; Java SE Embedded: 8u261\"}]}}]}, \"vendor_name\": \"Oracle Corporation\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).\"}]}, \"impact\": {\"cvss\": {\"baseScore\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N\", \"version\": \"3.1\"}}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data.\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\", \"refsource\": \"MISC\", \"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\"}, {\"name\": \"https://security.netapp.com/advisory/ntap-20201023-0004/\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.netapp.com/advisory/ntap-20201023-0004/\"}, {\"name\": \"DSA-4779\", \"refsource\": \"DEBIAN\", \"url\": \"https://www.debian.org/security/2020/dsa-4779\"}, {\"name\": \"[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update\", \"refsource\": \"MLIST\", \"url\": \"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html\"}, {\"name\": \"openSUSE-SU-2020:1893\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html\"}, {\"name\": \"GLSA-202101-19\", \"refsource\": \"GENTOO\", \"url\": \"https://security.gentoo.org/glsa/202101-19\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T13:00:50.871Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.oracle.com/security-alerts/cpuoct2020.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.netapp.com/advisory/ntap-20201023-0004/\"}, {\"name\": \"DSA-4779\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"], \"url\": \"https://www.debian.org/security/2020/dsa-4779\"}, {\"name\": \"[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html\"}, {\"name\": \"openSUSE-SU-2020:1893\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html\"}, {\"name\": \"GLSA-202101-19\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"], \"url\": \"https://security.gentoo.org/glsa/202101-19\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-14798\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T19:44:17.079782Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T19:45:59.147Z\"}}]}", "cveMetadata": "{\"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"assignerShortName\": \"oracle\", \"cveId\": \"CVE-2020-14798\", \"datePublished\": \"2020-10-21T14:04:25\", \"dateReserved\": \"2020-06-19T00:00:00\", \"dateUpdated\": \"2024-09-26T20:21:17.899Z\", \"state\": \"PUBLISHED\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2020-14798
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html | Mailing List, Third Party Advisory | |
secalert_us@oracle.com | https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html | Mailing List, Third Party Advisory | |
secalert_us@oracle.com | https://security.gentoo.org/glsa/202101-19 | Third Party Advisory | |
secalert_us@oracle.com | https://security.netapp.com/advisory/ntap-20201023-0004/ | Third Party Advisory | |
secalert_us@oracle.com | https://www.debian.org/security/2020/dsa-4779 | Third Party Advisory | |
secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpuoct2020.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202101-19 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20201023-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4779 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 7 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 8 | |
oracle | openjdk | 11 | |
oracle | openjdk | 11.0.1 | |
oracle | openjdk | 11.0.2 | |
oracle | openjdk | 11.0.3 | |
oracle | openjdk | 11.0.4 | |
oracle | openjdk | 11.0.5 | |
oracle | openjdk | 11.0.6 | |
oracle | openjdk | 11.0.7 | |
oracle | openjdk | 11.0.8 | |
oracle | openjdk | 13 | |
oracle | openjdk | 13.0.1 | |
oracle | openjdk | 13.0.2 | |
oracle | openjdk | 13.0.3 | |
oracle | openjdk | 13.0.4 | |
oracle | openjdk | 15 | |
oracle | jdk | 1.7.0 | |
oracle | jdk | 1.8.0 | |
oracle | jdk | 11.0.8 | |
oracle | jdk | 15 | |
oracle | jre | 1.7.0 | |
oracle | jre | 1.8.0 | |
oracle | jre | 11.0.8 | |
oracle | jre | 15 | |
netapp | 7-mode_transition_tool | - | |
netapp | active_iq_unified_manager | * | |
netapp | active_iq_unified_manager | * | |
netapp | e-series_santricity_os_controller | * | |
netapp | e-series_santricity_storage_manager | - | |
netapp | e-series_santricity_web_services_proxy | - | |
netapp | hci_management_node | - | |
netapp | oncommand_insight | - | |
netapp | oncommand_unified_manager | - | |
netapp | santricity_cloud_connector | - | |
netapp | santricity_unified_manager | - | |
netapp | snapmanager | - | |
netapp | snapmanager | - | |
netapp | solidfire | - | |
netapp | hci_storage_node | - | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | leap | 15.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "matchCriteriaId": "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "matchCriteriaId": "02011EDC-20A7-4A16-A592-7C76E0037997", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "matchCriteriaId": "AC6D4652-1226-4C60-BEDF-01EBF8AC0849", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "matchCriteriaId": "3C1F9ED7-7D93-41F4-9130-15BA734420AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "matchCriteriaId": "1CF9CDF1-95D3-4125-A73F-396D2280FC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "matchCriteriaId": "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "matchCriteriaId": "C28388AB-CFC9-4749-A90F-383F5B905EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "matchCriteriaId": "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "matchCriteriaId": "CA7AD457-6CE6-4925-8D94-A907B40233D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "matchCriteriaId": "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "matchCriteriaId": "5480E5AD-DB46-474A-9B57-84ED088A75FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "matchCriteriaId": "881A4AE9-6012-4E91-98BE-0A352CC20703", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "matchCriteriaId": "7E1E1079-57D9-473B-A017-964F4745F329", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "matchCriteriaId": "B8D6446E-2915-4F12-87BE-E7420BC2626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "matchCriteriaId": "564EDCE3-16E6-401D-8A43-032D1F8875E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "matchCriteriaId": "08278802-D31B-488A-BA6A-EBC816DF883A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "matchCriteriaId": "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "matchCriteriaId": "7BBB0969-565E-43E2-B067-A10AAA5F1958", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "matchCriteriaId": "D78BE95D-6270-469A-8035-FCDDB398F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "matchCriteriaId": "88C24F40-3150-4584-93D9-8307DE04EEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "matchCriteriaId": "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "matchCriteriaId": "19626B36-62FC-4497-A2E1-7D6CD9839B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "matchCriteriaId": "5713AEBD-35F6-44E8-A0CC-A42830D7AE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "matchCriteriaId": "8BE0C04B-440E-4B35-ACC8-6264514F764C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "matchCriteriaId": "555EC2A6-0475-48ED-AE0C-B306714A9333", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "matchCriteriaId": "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", "matchCriteriaId": "02C55E2E-AEDE-455C-B128-168C918B5D97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", "matchCriteriaId": "81831D37-6597-441B-87DE-38F7191BEA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", "matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", "matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", "matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", "matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", "matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", "matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", "matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", "matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", "matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", "matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", "matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", "matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", "matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", "matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11:*:*:*:*:*:*:*", "matchCriteriaId": "465CFA59-8E94-415A-ACF0-E678826813BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "85BDC28A-484B-4D14-8D68-890450DCE3F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "635DEFDD-4840-48C6-AB1C-ADAFF4A1E50C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "40A221DB-1684-4C87-B576-0969FE13E1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "DE6A1B86-3688-4A13-AB37-DBD0DA323202", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "17E0085B-4748-4F79-BEF6-CD9C3D2E6FE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3C4DAA76-EAA9-4C85-A92A-181EA49F3270", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "19FC2907-1712-4E81-AC35-E3A15BF27606", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:11.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "140F8ECC-F5DB-474E-ADA4-99EC9FBA45EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:13:*:*:*:*:*:*:*", "matchCriteriaId": "FD3A4AFB-8D76-4B16-A306-2A10F23E51EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:13.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1704C904-6E0A-4972-BC94-326D8BC6315A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:13.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "35FA24D1-8BDA-4DD4-A74C-C041C44A1455", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:13.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "790FD30A-CE27-4A1E-A753-BE0A6B17B262", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:13.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "254B5086-305E-4A19-8845-02BF7B8AA3F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:15:*:*:*:*:*:*:*", "matchCriteriaId": "65118341-0005-405D-B688-A3D98FD97A76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*", "matchCriteriaId": "3D07DCC8-4D24-4B8F-B72E-83DC311BD683", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*", "matchCriteriaId": "AAC508A2-CF8A-4037-87C8-B87E19ABC644", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:11.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "41F90A96-7F92-4DB8-9B76-BA558FDF9BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:15:*:*:*:*:*:*:*", "matchCriteriaId": "F3917541-7ACF-4033-86EC-DB54938DBF41", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update271:*:*:*:*:*:*", "matchCriteriaId": "CD023425-3457-4ABC-B1CF-9BA2F68924F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update261:*:*:*:*:*:*", "matchCriteriaId": "240E3859-040C-4E94-806C-E40E9E2C5EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:11.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EB90BAC0-EC64-48BF-9B22-41F5B540AB04", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:15:*:*:*:*:*:*:*", "matchCriteriaId": "4806C163-0E76-49C3-BE42-F90E4B451051", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "BD075607-09B7-493E-8611-66D041FFDA62", "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "0CB28AF5-5AF0-4475-A7B6-12E1795FFDCB", "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFA6AD29-34C2-4FEC-9585-C42C6615C6CC", "versionEndIncluding": "11.60.1", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D9CC59D-6182-4B5E-96B5-226FCD343916", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F148EC-6D6D-4C4F-B57C-CFBCD3D32B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "C18CA4B5-28FD-4199-B1F0-B1E59E920370", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB15BCF1-1B1D-49D8-9B76-46DCB10044DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "A372B177-F740-4655-865C-31777A6E140B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "matchCriteriaId": "25BBBC1A-228F-45A6-AE95-DB915EDF84BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", "matchCriteriaId": "C57D2B31-9696-4451-BA04-D093FFCF7E39", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)." }, { "lang": "es", "value": "Vulnerabilidad en el producto Java SE, Java SE Embedded de Oracle Java SE (componente: Libraries).\u0026#xa0;Las versiones compatibles que est\u00e1n afectadas son Java SE: 7u271, 8u261, 11.0.8 y 15;\u0026#xa0;Java SE integrado: 8u261.\u0026#xa0;Una vulnerabilidad dif\u00edcil de explotar permite a un atacante no autenticado con acceso a la red por medio de m\u00faltiples protocolos comprometer a Java SE, Java SE Embedded.\u0026#xa0;Los ataques con \u00e9xito requieren la interacci\u00f3n humana de una persona diferente del atacante.\u0026#xa0;Los ataques con \u00e9xito de esta vulnerabilidad pueden resultar en la actualizaci\u00f3n no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Java SE, Java SE Embedded.\u0026#xa0;Nota: Esta vulnerabilidad aplica a las implementaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start en sandbox o applets de Java en sandbox, que cargan y ejecutan c\u00f3digo que no es de confianza (por ejemplo, c\u00f3digo que proviene de Internet) y conf\u00edan en el sandbox de Java para su seguridad.\u0026#xa0;Esta vulnerabilidad no aplica a las implementaciones de Java, generalmente en servidores, que cargan y ejecutan solo c\u00f3digo confiable (por ejemplo, c\u00f3digo instalado por un administrador).\u0026#xa0;CVSS 3.1 Puntuaci\u00f3n Base 3.1 (Impactos de la Integridad).\u0026#xa0;Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)" } ], "id": "CVE-2020-14798", "lastModified": "2025-05-27T16:43:05.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "secalert_us@oracle.com", "type": "Secondary" } ] }, "published": "2020-10-21T15:15:19.780", "references": [ { "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-19" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4779" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2020:3932-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]\n CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779\n CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n * Class libraries:\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time\n that the set timeout\n - Z/OS specific C function send_file is changing the file pointer\n position\n * Java Virtual Machine:\n - Crash on iterate java stack\n - Java process hang on SIGTERM\n * JIT Compiler:\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n * Class Libraries:\n - z15 high utilization following Z/VM and Linux migration from\n z14 To z15\n * Java Virtual Machine:\n - Assertion failed when trying to write a class file\n - Assertion failure at modronapi.cpp\n - Improve the performance of defining and finding classes\n * JIT Compiler:\n - An assert in ppcbinaryencoding.cpp may trigger when running\n with traps disabled on power\n - AOT field offset off by n bytes\n - Segmentation fault in jit module on ibm z platform", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3932,SUSE-SLE-Module-Legacy-15-SP1-2020-3932,SUSE-SLE-Module-Legacy-15-SP2-2020-3932,SUSE-SLE-Module-Legacy-15-SP3-2020-3932,SUSE-SLE-Product-SLES-15-2020-3932,SUSE-SLE-Product-SLES_SAP-15-2020-3932", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3932-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3932-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203932-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3932-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE Bug 1180063", "url": "https://bugzilla.suse.com/1180063" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2020-12-23T17:22:34Z", "generator": { "date": "2020-12-23T17:22:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3932-1", "initial_release_date": "2020-12-23T17:22:34Z", "revision_history": [ { "date": "2020-12-23T17:22:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-3.47.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-23T17:22:34Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:3460-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*, bool)\u0027,\n introduced in October 2020 CPU.\n\n- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\n bsc#1174157, and October 2020 CPU, bsc#1177943)\n * New features\n + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7\n + PR3796: Allow the number of curves supported to be specified\n * Security fixes\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in\n sun.security.util.DerInputStream.getUnalignedBitString()\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233255: Better Swing Buttons\n + JDK-8233624: Enhance JNI linkage\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240124: Better VM Interning\n + JDK-8240482: Improved WAV file playback\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Import of OpenJDK 8 u262 build 01\n + JDK-4949105: Access Bridge lacks html tags parsing\n + JDK-8003209: JFR events for network utilization\n + JDK-8030680: 292 cleanup from default method code assessment\n + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java\n and some tests failed on windows intermittently\n + JDK-8041626: Shutdown tracing event\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n + JDK-8149338: JVM Crash caused by Marlin renderer not handling\n NaN coordinates\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to \u0027Connection\n succeeded\u0027\n + JDK-8165675: Trace event for thread park has incorrect unit\n for timeout\n + JDK-8176182: 4 security tests are not run\n + JDK-8178910: Problemlist sample tests\n + JDK-8183925: Decouple crash protection from watcher thread\n + JDK-8191393: Random crashes during cfree+0x1c\n + JDK-8195817: JFR.stop should require name of recording\n + JDK-8195818: JFR.start should increase autogenerated name by\n one\n + JDK-8195819: Remove recording=x from jcmd JFR.check output\n + JDK-8199712: Flight Recorder\n + JDK-8202578: Revisit location for class unload events\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on\n missing events\n + JDK-8203287: Zero fails to build after JDK-8199712 (Flight\n Recorder)\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n + JDK-8203664: JFR start failure after AppCDS archive created\n with JFR StartFlightRecording\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n + JDK-8203929: Limit amount of data for JFR.dump\n + JDK-8205516: JFR tool\n + JDK-8207392: [PPC64] Implement JFR profiling\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first\n classloader which calls it\n + JDK-8209960: -Xlog:jfr* doesn\u0027t work with the JFR\n + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD\n 1.0.7\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n + JDK-8213015: Inconsistent settings between JFR.configure and\n -XX:FlightRecorderOptions\n + JDK-8213421: Line number information for execution samples\n always 0\n + JDK-8213617: JFR should record the PID of the recorded process\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n + JDK-8213914: [TESTBUG] Several JFR VM events are not covered\n by tests\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by\n test\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n + JDK-8214542: JFR: Old Object Sample event slow on a deep heap\n in debug builds\n + JDK-8214750: Unnecessary \u003cp\u003e tags in jfr classes\n + JDK-8214896: JFR Tool left files behind\n + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java\n fails with UnsatisfiedLinkError\n + JDK-8214925: JFR tool fails to execute\n + JDK-8215175: Inconsistencies in JFR event metadata\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n + JDK-8215355: Object monitor deadlock with no threads holding\n the monitor (using jemalloc 5.1)\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n + JDK-8215771: The jfr tool should pretty print reference chains\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn\u0027t work\n properly\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n + JDK-8216559: [JFR] Native libraries not correctly parsed from\n /proc/self/maps\n + JDK-8216578: Remove unused/obsolete method in JFR code\n + JDK-8216995: Clean up JFR command line processing\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some\n systems due to process surviving SIGINT\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR\n TestShutdownEvent\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n + JDK-8223147: JFR Backport\n + JDK-8223689: Add JFR Thread Sampling Support\n + JDK-8223690: Add JFR BiasedLock Event Support\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n + JDK-8224475: JTextPane does not show images in HTML rendering\n + JDK-8226253: JAWS reports wrong number of radio buttons when\n buttons are hidden.\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n + JDK-8226892: ActionListeners on JRadioButtons don\u0027t get\n notified when selection is changed with arrow keys\n + JDK-8227011: Starting a JFR recording in response to JVMTI\n VMInit and / or Java agent premain corrupts memory\n + JDK-8227605: Kitchensink fails \u0027assert((((klass)-\u003etrace_id()\n \u0026 (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant\u0027\n + JDK-8229366: JFR backport allows unchecked writing to memory\n + JDK-8229401: Fix JFR code cache test failures\n + JDK-8229708: JFR backport code does not initialize\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on\n Windows\n + JDK-8230707: JFR related tests are failing\n + JDK-8230782: Robot.createScreenCapture() fails if\n \u0027awt.robot.gtk\u0027 is set to false\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on\n unix misses ReleaseStringUTFChars in early return\n + JDK-8230947: TestLookForUntestedEvents.java is failing after\n JDK-8230707\n + JDK-8231995: two jtreg tests failed after 8229366 is fixed\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n + JDK-8236002: CSR for JFR backport suggests not leaving out\n the package-info\n + JDK-8236008: Some backup files were accidentally left in the\n hotspot tree\n + JDK-8236074: Missed package-info\n + JDK-8236174: Should update javadoc since tags\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when\n there are external FIPS modules in the NSSDB\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n + JDK-8238590: Enable JFR by default during compilation in 8u\n + JDK-8239055: Wrong implementation of VMState.hasListener\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n + JDK-8239479: minimal1 and zero builds are failing\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n + JDK-8240375: Disable JFR by default for July 2020 release\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n * Import of OpenJDK 8 u262 build 02\n + JDK-8130737: AffineTransformOp can\u0027t handle child raster with\n non-zero x-offset\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation\n in java/awt/image/Raster/TestChildRasterOp.java\n + JDK-8230926: [macosx] Two apostrophes are entered instead of\n one with \u0027U.S. International - PC\u0027 layout\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n + JDK-8242883: Incomplete backport of JDK-8078268: backport\n test part\n * Import of OpenJDK 8 u262 build 03\n + JDK-8037866: Replace the Fun class in tests with lambdas\n + JDK-8146612: C2: Precedence edges specification violated\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects HPROF\n JAVA PROFILE 1.0.1 file format\n + JDK-8229888: (zipfs) Updating an existing zip file does not\n preserve original permissions\n + JDK-8230597: Update GIFlib library to the 5.2.1\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n + JDK-8233880, PR3798: Support compilers with multi-digit major\n version numbers\n + JDK-8239852: java/util/concurrent tests fail with\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:\n verification should have failed\n + JDK-8241638: launcher time metrics always report 1 on Linux\n when _JAVA_LAUNCHER_DEBUG set\n + JDK-8243059: Build fails when --with-vendor-name contains a\n comma\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n * Import of OpenJDK 8 u262 build 04\n + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn\u0027t\n throw NPE if timeout is less than, or equal to zero when unit\n == null\n + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()\n does not recognize OpenJDK\u0027s HotSpot VM\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n + JDK-8243539: Copyright info (Year) should be updated for fix\n of 8241638\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash value\n * Import of OpenJDK 8 u262 build 05\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn\u0027t run in agentvm mode\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n + JDK-8181841: A TSA server returns timestamp with precision\n higher than milliseconds\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n + JDK-8236996: Incorrect Roboto font rendering on Windows with\n subpixel antialiasing\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n + JDK-8244843: JapanEraNameCompatTest fails\n * Import of OpenJDK 8 u262 build 06\n + JDK-8246223: Windows build fails after JDK-8227269\n * Import of OpenJDK 8 u262 build 07\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and\n Jfr:on_vm_start() start-up order for correct option parsing\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n + JDK-8245167: Top package in method profiling shows null in JMC\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n * Import of OpenJDK 8 u262 build 08\n + JDK-8220293: Deadlock in JFR string pool\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n + JDK-8225069: Remove Comodo root certificate that is expiring\n in May 2020\n * Import of OpenJDK 8 u262 build 09\n + JDK-8248399: Build installs jfr binary when JFR is disabled\n * Import of OpenJDK 8 u262 build 10\n + JDK-8248715: New JavaTimeSupplementary localisation for \u0027in\u0027\n installed in wrong package\n * Import of OpenJDK 8 u265 build 01\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n + JDK-8250546: Expect changed behaviour reported in JDK-8249846\n * Import of OpenJDK 8 u272 build 01\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n + JDK-8075774: Small readability and performance improvements\n for zipfs\n + JDK-8132206: move ScanTest.java into OpenJDK\n + JDK-8132376: Add @requires os.family to the client tests with\n access to internal OS-specific API\n + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n + JDK-8165936: Potential Heap buffer overflow when seaching\n timezone info files\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n + JDK-8167300: Scheduling failures during gcm should be fatal\n + JDK-8167615: Opensource unit/regression tests for JavaSound\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n + JDK-8177628: Opensource unit/regression tests for ImageIO\n + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java\n + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n + JDK-8193137: Nashorn crashes when given an empty script file\n + JDK-8194298: Add support for per Socket configuration of TCP\n keepalive\n + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java\n throws error\n + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java\n fails\n + JDK-8210147: adjust some WSAGetLastError usages in windows\n network coding\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n + JDK-8217647: JFR: recordings on 32-bit systems unreadable\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8230303: JDB hangs when running monitor command\n + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)\n return NULL if n is not in the CG\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n + JDK-8235325: build failure on Linux after 8235243\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink\n + JDK-8237951: CTW: C2 compilation fails with \u0027malformed\n control flow\u0027\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8239819: XToolkit: Misread of screen information memory\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n + JDK-8242498: Invalid \u0027sun.awt.TimedWindowEvent\u0027 object leads\n to JVM crash\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n + JDK-8246384: Enable JFR by default on supported architectures\n for October 2020 release\n + JDK-8248643: Remove extra leading space in JDK-8240295 8u\n backport\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String... keys)\n method public\n * Import of OpenJDK 8 u272 build 02\n + JDK-8023697: failed class resolution reports different class\n name in detail message for the first and subsequent times\n + JDK-8025886: replace [[ and == bash extensions in regtest\n + JDK-8046274: Removing dependency on jakarta-regexp\n + JDK-8048933: -XX:+TraceExceptions output should include the\n message\n + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/\n /fileaccess/FontFile.java fails\n + JDK-8148854: Class names \u0027SomeClass\u0027 and \u0027LSomeClass;\u0027\n treated by JVM as an equivalent\n + JDK-8154313: Generated javadoc scattered all over the place\n + JDK-8163251: Hard coded loop limit prevents reading of smart\n card data greater than 8k\n + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java\n fails with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n + JDK-8201633: Problems with AES-GCM native acceleration\n + JDK-8211049: Second parameter of \u0027initialize\u0027 method is not\n used\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n + JDK-8220555: JFR tool shows potentially misleading message\n when it cannot access a file\n + JDK-8224217: RecordingInfo should use textual representation\n of path\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/\n /SctpNet.c \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o \u0027multiple\n definition\u0027 link errors with GCC10\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n * Import of OpenJDK 8 u272 build 03\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n + JDK-8148754: C2 loop unrolling fails due to unexpected graph\n shape\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests\n fail with error : revokeall.exe: Permission denied\n + JDK-8203357: Container Metrics\n + JDK-8209113: Use WeakReference for lastFontStrike for created\n Fonts\n + JDK-8216283: Allow shorter method sampling interval than 10 ms\n + JDK-8221569: JFR tool produces incorrect output when both\n --categories and --events are specified\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8250875: Incorrect parameter type for update_number in\n JDK_Version::jdk_update\n * Import of OpenJDK 8 u272 build 04\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws\n IllegalArgumentException for flags of type double\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n + JDK-8217878: ENVELOPING XML signature no longer works in JDK\n 11\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n * Import of OpenJDK 8 u272 build 05\n + JDK-8026236: Add PrimeTest for BigInteger\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n + JDK-8152077: (cal) Calendar.roll does not always roll the\n hours during daylight savings\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n + JDK-8211163: UNIX version of Java_java_io_Console_echo does\n not return a clean boolean\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in\n docker container only works with debug JVMs\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n * Import of OpenJDK 8 u272 build 06\n + JDK-8064319: Need to enable -XX:+TraceExceptions in release\n builds\n + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11\n v2.40 support\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()\n not working\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface\n license\n + JDK-8184762: ZapStackSegments should use optimized memset\n + JDK-8193234: When using -Xcheck:jni an internally allocated\n buffer can leak\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n + JDK-8220313: [TESTBUG] Update base image for Docker testing\n to OL 7.6\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8225695: 32-bit build failures after JDK-8080462 (Update\n SunPKCS11 provider with PKCS11 v2.40 support)\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension property\n name\n + JDK-8238898, PR3801: Missing hash characters for header on\n license file\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n + JDK-8245469: Remove DTLS protocol implementation\n + JDK-8245470: Fix JDK8 compatibility issues\n + JDK-8245471: Revert JDK-8148188\n + JDK-8245472: Backport JDK-8038893 to JDK8\n + JDK-8245473: OCSP stapling support\n + JDK-8245474: Add TLS_KRB5 cipher suites support according to\n RFC-2712\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n + JDK-8245477: Adjust TLS tests location\n + JDK-8245653: Remove 8u TLS tests\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is\n set to either true or false\n + JDK-8251341: Minimal Java specification change\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n * Import of OpenJDK 8 u272 build 07\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n * Import of OpenJDK 8 u272 build 08\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8252573: 8u: Windows build failed after 8222079 backport\n * Import of OpenJDK 8 u272 build 09\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n * Import of OpenJDK 8 u272 build 10\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed\n by the fix for JDK-8249158\n + JDK-8254937: Revert JDK-8148854 for 8u272\n * Backports\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several\n client tests unaffected by the automated bulk update\n + JDK-8144015, PR3806: [PIT] failures of text layout font tests\n + JDK-8144023, PR3806: [PIT] failure of text measurements in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.java\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8145542, PR3806: The case failed automatically and thrown\n java.lang.ArrayIndexOutOfBoundsException exception\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when\n displaying Devanagari text in JEditorPane\n + JDK-8152358, PR3800: code and comment cleanups found during\n the hunt for 8077392\n + JDK-8152545, PR3804: Use preprocessor instead of compiling a\n program to generate native nio constants\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation failed\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n + JDK-8191522, PR3806: Remove Bigelow\u0026Holmes Lucida fonts from\n JDK sources\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n * Bug fixes\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a \u0027%s\u0027 directive\n + PR3795: ECDSAUtils for XML digital signatures should support\n the same curve set as the rest of the JDK\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n + PR3808: IcedTea does not install the JFR *.jfc files\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has\n fixed its use with Shenandoah\n + PR3811: Don\u0027t attempt to install JFR files when JFR is\n disabled\n * Shenandoah\n + [backport] 8221435: Shenandoah should not mark through weak\n roots\n + [backport] 8221629: Shenandoah: Cleanup class unloading logic\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n + [backport] 8223215: Shenandoah: Support verifying subset of\n roots\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache roots\n + [backport] 8224508: Shenandoah: Need to update thread roots\n in final mark for piggyback ref update cycle\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n --disable-precompiled-headers\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n + [backport] 8224751: Shenandoah: Shenandoah Verifier should\n select proper roots according to current GC cycle\n + [backport] 8225014: Separate ShenandoahRootScanner method for\n object_iterate\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn\u0027t\n work for Shenandoah\n + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to\n ensure roots to-space invariant\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n + [backport] 8226413: Shenandoah: Separate root scanner for\n SH::object_iterate()\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n + [backport] 8231198: Shenandoah: heap walking should visit all\n roots most of the time\n + [backport] 8231244: Shenandoah: all-roots heap walking misses\n some weak roots\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n + [backport] 8239786: Shenandoah: print per-cycle statistics\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod\u0027s metadata\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n + [backport] 8240750: Shenandoah: remove leftover files and\n mentions of ShenandoahAllocTracker\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n + [backport] 8240872: Shenandoah: Avoid updating new regions\n from start of evacuation\n + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers\n + [backport] 8240915: Shenandoah: Remove unused fields in init\n mark tasks\n + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects\n paths after JDK-8240868\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + [backport] 8241062: Shenandoah: rich asserts trigger \u0027empty\n statement\u0027 inspection\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n + [backport] 8241093: Shenandoah: editorial changes in flag\n descriptions\n + [backport] 8241139: Shenandoah: distribute mark-compact work\n exactly to minimize fragmentation\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n + [backport] 8241351: Shenandoah: fragmentation metrics overhaul\n + [backport] 8241435: Shenandoah: avoid disabling pacing with\n \u0027aggressive\u0027\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n + [backport] 8241534: Shenandoah: region status should include\n update watermark\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n + [backport] 8241583: Shenandoah: turn heap lock asserts into\n macros\n + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not\n derive from ContiguousSpace\n + [backport] 8241673: Shenandoah: refactor anti-false-sharing\n padding\n + [backport] 8241675: Shenandoah: assert(n-\u003eoutcnt() \u003e 0) at\n shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n + [backport] 8241748: Shenandoah: inline MarkingContext TAMS\n methods\n + [backport] 8241838: Shenandoah: no need to trash cset during\n final mark\n + [backport] 8241841: Shenandoah: ditch one of allocation type\n counters in ShenandoahHeapRegion\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions\n to cache lines\n + [backport] 8241926: Shenandoah: only print heap changes for\n operations that directly affect it\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n + [backport] 8241985: Shenandoah: simplify collectable garbage\n logging\n + [backport] 8242040: Shenandoah: print allocation failure type\n + [backport] 8242041: Shenandoah: adaptive heuristics should\n account evac reserve in free target\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n + [backport] 8242054: Shenandoah: New incremental-update mode\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n + [backport] 8242083: Shenandoah: split \u0027Prepare Evacuation\u0027\n tracking into cset/freeset counters\n + [backport] 8242089: Shenandoah: per-worker stats should be\n summed up, not averaged\n + [backport] 8242101: Shenandoah: coalesce and parallelise heap\n region walks during the pauses\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier\n dispatching\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n + [backport] 8242227: Shenandoah: transit regions to cset state\n when adding to collection set\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion\n liveness-related methods\n + [backport] 8242267: Shenandoah: regions space needs to be\n aligned by os::vm_allocation_granularity()\n + [backport] 8242271: Shenandoah: add test to verify GC mode\n unlock\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n + [backport] 8242316: Shenandoah: Turn NULL-check into assert\n in SATB slow-path entry\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n + [backport] 8242641: Shenandoah: clear live data and update\n TAMS optimistically\n + [backport] 8243238: Shenandoah: explicit GC request should\n wait for a complete GC cycle\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n + [backport] 8243463: Shenandoah: ditch total_pause counters\n + [backport] 8243464: Shenandoah: print statistic counters in\n time order\n + [backport] 8243465: Shenandoah: ditch unused pause_other,\n conc_other counters\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n + [backport] 8243494: Shenandoah: set counters once per cycle\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n + [backport] 8243848: Shenandoah: Windows build fails after\n JDK-8239786\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n + [backport] 8244226: Shenandoah: per-cycle statistics contain\n worker data from previous cycles\n + [backport] 8244326: Shenandoah: global statistics should not\n accept bogus samples\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state\n takes loop for wrong control\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the heuristics\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n + [backport] 8244739: Shenandoah: break superclass dependency\n on ShenandoahNormalMode\n + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode\n to ShenandoahSATBMode\n + [backport] 8245461: Shenandoah: refine mode name()-s\n + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings\n constructor arguments\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n + [backport] 8245465: Shenandoah: test_in_cset can use more\n efficient encoding\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should not\n disable heap resizing or uncommits\n + [backport] 8245773: Shenandoah: Windows assertion failure\n after JDK-8245464\n + [backport] 8245812: Shenandoah: compute root phase parallelism\n + [backport] 8245814: Shenandoah: reconsider format specifiers\n for stats\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n + [backport] 8246162: Shenandoah: full GC does not mark code\n roots when class unloading is off\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n + [backport] 8247358: Shenandoah: reconsider free budget slice\n for marking\n + [backport] 8247367: Shenandoah: pacer should wait on lock\n instead of exponential backoff\n + [backport] 8247474: Shenandoah: Windows build warning after\n JDK-8247310\n + [backport] 8247560: Shenandoah: heap iteration holds root\n locks all the time\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n + [backport] 8247751: Shenandoah: options tests should run with\n smaller heaps\n + [backport] 8247754: Shenandoah: mxbeans tests can be shorter\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n + [backport] 8247860: Shenandoah: add update watermark line in\n rich assert failure message\n + [backport] 8248041: Shenandoah: pre-Full GC root updates may\n miss some roots\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n + [backport] 8249560: Shenandoah: Fix racy GC request handling\n + [backport] 8249649: Shenandoah: provide per-cycle pacing stats\n + [backport] 8249801: Shenandoah: Clear soft-refs on requested\n GC cycle\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n + Fix slowdebug build after JDK-8230853 backport\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n + Shenandoah: add root statistics for string dedup table/queues\n + Shenandoah: enable low-frequency STW class unloading\n + Shenandoah: fix build failures after JDK-8244737 backport\n + Shenandoah: Fix build failure with +JFR -PCH\n + Shenandoah: fix forceful pacer claim\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n + Shenandoah: fix runtime linking failure due to non-compiled\n shenandoahBarrierSetC1\n + Shenandoah: hook statistics printing to PrintGCDetails, not\n PrintGC\n + Shenandoah: JNI weak roots are always cleared before Full GC\n mark\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n + Shenandoah: move barrier sets to their proper locations\n + Shenandoah: move parallelCleaning.* to shenandoah/\n + Shenandoah: pacer should use proper Atomics for intptr_t\n + Shenandoah: properly deallocates class loader metadata\n + Shenandoah: specialize String Table scans for better pause\n performance\n + Shenandoah: Zero build fails after recent Atomic cleanup in\n Pacer\n * AArch64 port\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java\n generates guarantee failure in C1\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection from\n watcher thread\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n + JDK-8203481, PR3797: Incorrect constraint for unextended_sp\n in frame:safe_for_sender\n + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall\n fails with SIGILL on aarch64\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command\n + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java\n fails on AArch64\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()\n does not check for zero length on AARCH64\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n + JDK-8221658, PR3797: aarch64: add necessary predicate for\n ubfx patterns\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n + JDK-8247979, PR3797: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3460,SUSE-SLE-Module-Legacy-15-SP1-2020-3460,SUSE-SLE-Module-Legacy-15-SP2-2020-3460,SUSE-SLE-Product-SLES-15-2020-3460,SUSE-SLE-Product-SLES_SAP-15-2020-3460", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3460-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3460-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203460-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3460-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2020-11-20T11:41:47Z", "generator": { "date": "2020-11-20T11:41:47Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3460-1", "initial_release_date": "2020-11-20T11:41:47Z", "revision_history": [ { "date": "2020-11-20T11:41:47Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.272-3.42.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-3.42.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-3.42.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.272-3.42.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-3.42.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-3.42.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-demo-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-devel-1.8.0.272-3.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:java-1_8_0-openjdk-headless-1.8.0.272-3.42.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T11:41:47Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2021:0019-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_1-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_1-ibm fixes the following issues:\n\n- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]\n CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781\n CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n * Class Libraries:\n - Z/OS specific C function send_file is changing the file pointer position\n * Security:\n - Add the new oracle signer certificate\n - Certificate parsing error\n - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider\n - Remove check for websphere signed jars\n - sessionid.hashcode generates too many collisions\n - The Java 8 IBM certpath provider does not honor the user\n specified system property for CLR connect timeout\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2021-19,SUSE-2021-19,SUSE-OpenStack-Cloud-7-2021-19,SUSE-OpenStack-Cloud-8-2021-19,SUSE-OpenStack-Cloud-9-2021-19,SUSE-OpenStack-Cloud-Crowbar-8-2021-19,SUSE-OpenStack-Cloud-Crowbar-9-2021-19,SUSE-SLE-SAP-12-SP2-2021-19,SUSE-SLE-SAP-12-SP3-2021-19,SUSE-SLE-SAP-12-SP4-2021-19,SUSE-SLE-SDK-12-SP5-2021-19,SUSE-SLE-SERVER-12-SP2-2021-19,SUSE-SLE-SERVER-12-SP2-BCL-2021-19,SUSE-SLE-SERVER-12-SP3-2021-19,SUSE-SLE-SERVER-12-SP3-BCL-2021-19,SUSE-SLE-SERVER-12-SP4-LTSS-2021-19,SUSE-SLE-SERVER-12-SP5-2021-19,SUSE-Storage-5-2021-19", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0019-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0019-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210019-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0019-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE Bug 1180063", "url": "https://bugzilla.suse.com/1180063" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_7_1-ibm", "tracking": { "current_release_date": "2021-01-04T15:14:52Z", "generator": { "date": "2021-01-04T15:14:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0019-1", "initial_release_date": "2021-01-04T15:14:52Z", "revision_history": [ { "date": "2021-01-04T15:14:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.i586", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.i586", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.ppc64le", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.ppc64le", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.ppc64le", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.ppc64le", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390x", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390x", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.75-38.59.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.x86_64", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.x86_64", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.75-38.59.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "HPE Helion OpenStack 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Enterprise Storage 5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-04T15:14:52Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:3310-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_0-openjdk fixes the following issues:\n\n- Update to 2.6.24 - OpenJDK 7u281 (October 2020 CPU, bsc#1177943)\n * Security fixes\n + JDK-8233624: Enhance JNI linkage\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8240124: Better VM Interning\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Import of OpenJDK 7 u281 build 1\n + JDK-8145096: Undefined behaviour in HotSpot\n + JDK-8215265: C2: range check elimination may allow illegal\n out of bound access\n * Backports\n + JDK-8250861, PR3812: Crash in MinINode::Ideal(PhaseGVN*, bool)\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-3310,SUSE-2020-3310,SUSE-OpenStack-Cloud-7-2020-3310,SUSE-OpenStack-Cloud-8-2020-3310,SUSE-OpenStack-Cloud-9-2020-3310,SUSE-OpenStack-Cloud-Crowbar-8-2020-3310,SUSE-OpenStack-Cloud-Crowbar-9-2020-3310,SUSE-SLE-SAP-12-SP2-2020-3310,SUSE-SLE-SAP-12-SP3-2020-3310,SUSE-SLE-SAP-12-SP4-2020-3310,SUSE-SLE-SERVER-12-SP2-2020-3310,SUSE-SLE-SERVER-12-SP2-BCL-2020-3310,SUSE-SLE-SERVER-12-SP3-2020-3310,SUSE-SLE-SERVER-12-SP3-BCL-2020-3310,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3310,SUSE-SLE-SERVER-12-SP5-2020-3310,SUSE-Storage-5-2020-3310", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3310-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3310-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203310-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3310-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_7_0-openjdk", "tracking": { "current_release_date": "2020-11-12T15:04:09Z", "generator": { "date": "2020-11-12T15:04:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3310-1", "initial_release_date": "2020-11-12T15:04:09Z", "revision_history": [ { "date": "2020-11-12T15:04:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.aarch64", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.aarch64", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.i586", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.i586", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-javadoc-1.7.0.281-43.44.2.noarch", "product": { "name": "java-1_7_0-openjdk-javadoc-1.7.0.281-43.44.2.noarch", "product_id": "java-1_7_0-openjdk-javadoc-1.7.0.281-43.44.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.ppc64le", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.ppc64le", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390x", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390x", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.281-43.44.2.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.x86_64", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.x86_64", "product_id": "java-1_7_0-openjdk-src-1.7.0.281-43.44.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "HPE Helion OpenStack 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Enterprise Storage 5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-demo-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-devel-1.7.0.281-43.44.2.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_7_0-openjdk-headless-1.7.0.281-43.44.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T15:04:09Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:14587-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_0-ibm fixes the following issues:\n\n- Update to Java 7.0 Service Refresh 10 Fix Pack 75 [bsc#1180063, bsc#1177943]\n CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781\n CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n * Class Libraries:\n - Z/OS specific C function send_file is changing the file pointer position\n * Security:\n - Add the new oracle signer certificate\n - Certificate parsing error\n - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider\n - Remove check for websphere signed jars\n - sessionid.hashcode generates too many collisions\n - The Java 8 IBM certpath provider does not honor the user\n specified system property for CLR connect timeout\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-java-1_7_0-ibm-14587", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14587-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14587-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014587-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14587-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE Bug 1180063", "url": "https://bugzilla.suse.com/1180063" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_7_0-ibm", "tracking": { "current_release_date": "2020-12-22T09:54:35Z", "generator": { "date": "2020-12-22T09:54:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14587-1", "initial_release_date": "2020-12-22T09:54:35Z", "revision_history": [ { "date": "2020-12-22T09:54:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "product": { "name": "java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "product_id": "java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "product": { "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "product_id": "java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "product": { "name": "java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "product_id": "java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "product": { "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "product_id": "java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586", "product": { "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586", "product_id": "java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586" }, "product_reference": "java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586" }, "product_reference": "java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586" }, "product_reference": "java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586" }, "product_reference": "java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" }, "product_reference": "java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.75-65.57.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.75-65.57.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:54:35Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:14588-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_1-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_1-ibm fixes the following issues:\n\n- Update to Java 7.1 Service Refresh 4 Fix Pack 75 [bsc#1180063, bsc#1177943]\n CVE-2020-14792 CVE-2020-14797 CVE-2020-14782 CVE-2020-14781\n CVE-2020-14779 CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n * Class Libraries:\n - Z/OS specific C function send_file is changing the file pointer position\n * Security:\n - Add the new oracle signer certificate\n - Certificate parsing error\n - JVM memory growth can be caused by the IBMPKCS11IMPL crypto provider\n - Remove check for websphere signed jars\n - sessionid.hashcode generates too many collisions\n - The Java 8 IBM certpath provider does not honor the user\n specified system property for CLR connect timeout\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-java-1_7_1-ibm-14588", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14588-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:14588-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014588-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:14588-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE Bug 1180063", "url": "https://bugzilla.suse.com/1180063" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_7_1-ibm", "tracking": { "current_release_date": "2020-12-22T09:55:56Z", "generator": { "date": "2020-12-22T09:55:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:14588-1", "initial_release_date": "2020-12-22T09:55:56Z", "revision_history": [ { "date": "2020-12-22T09:55:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.75-26.62.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.75-26.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-12-22T09:55:56Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:3159-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,\n bsc#1177943)\n * New features\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector\n * Security fixes\n + JDK-8233624: Enhance JNI linkage\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8240124: Better VM Interning\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Other changes\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite loop\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed\n + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with Address\n already in use\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8172404: Tools should warn if weak algorithms are used\n before restricting them\n + JDK-8193367: Annotated type variable bounds crash javac\n + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java\n fails intermittently: Connection reset\n + JDK-8203026: java.rmi.NoSuchObjectException: no such object\n in table\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n + JDK-8204963: javax.swing.border.TitledBorder has a memory leak\n + JDK-8204994: SA might fail to attach to process with \u0027Windbg\n Error: WaitForEvent failed\u0027\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n + JDK-8206309: Tier1 SA tests fail\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java\n version - step1\n + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh\n is incorrect\n + JDK-8209342: Problemlist SA tests on Solaris due to Error\n attaching to process: Can\u0027t create thread_db agent!\n + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java\n should be marked as headful\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with\n timeout\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java\n version - step2\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with\n ZGC\n + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java\n + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error code\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java\n version - step3\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related\n tests\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails\n with waitForPrompt timed out after 60 seconds\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should\n clarify which output is the pending reply after a timeout\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java\n version - step4\n + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java\n fails to find ThreadLocalObject\n + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh\n test\n + JDK-8211694: JShell: Redeclared variable should be reset\n + JDK-8212200: assert when shared java.lang.Object is redefined\n by JVMTI agent\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)\n - unexpected. lastLine=52, minLine=52, maxLine=55\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by JVMTI\n agent)\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n + JDK-8213574: Deadlock in string table expansion when dumping\n lots of CDS classes\n + JDK-8213703: LambdaConversionException: Invalid receiver type\n not a subtype of implementation type interface\n + JDK-8214074: Ghash optimization using AVX instructions\n + JDK-8214491: Upgrade to JLine 3.9.0\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n + JDK-8215243: JShell tests failing intermitently with\n \u0027Problem cleaning up the following threads:\u0027\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash\n optimization using AVX instructions)\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n + JDK-8216021: RunTest.gmk might set concurrency level to 1 on\n Windows\n + JDK-8216974: HttpConnection not returned to the pool after\n 204 response\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are not\n reflected correctly during run time\n + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is\n too small on new Skylake CPUs\n + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs\n instead of aliased B\u0026W glyphs\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n + JDK-8221759: Crash when completing \u0027java.io.File.path\u0027\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not found\n + JDK-8222074: Enhance auto vectorization for x86\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely\n on hostname command\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n + JDK-8223940: Private key not supported by chosen signature\n algorithm\n + JDK-8224184: jshell got IOException at exiting with AIX\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails in\n test_mulc\n + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws\n NullPointerException\n + JDK-8225625: AES Electronic Codebook (ECB) encryption and\n decryption optimization using AVX512 + VAES instructions\n + JDK-8226536: Catch OOM from deopt that fails rematerializing\n objects\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java\n fails due to \u0027exitValue = 6\u0027\n + JDK-8228448: Jconsole can\u0027t connect to itself\n + JDK-8228967: Trust/Key store and SSL context utilities for\n tests\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8229815: Upgrade Jline to 3.12.1\n + JDK-8230000: some httpclients testng tests run zero test\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n + JDK-8230402: Allocation of compile task fails with assert:\n \u0027Leaking compilation tasks?\u0027\n + JDK-8230767: FlightRecorderListener returns null recording\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to\n test/jdk/java/util/zip/EntryCount64k.java\n + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()\n can be quicker for self thread\n + JDK-8231586: enlarge encoding space for OopMapValue offsets\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n + JDK-8232161: Align some one-way conversion in MS950 charset\n with Windows\n + JDK-8232855: jshell missing word in /help help\n + JDK-8233027: OopMapSet::all_do does oms.next() twice during\n iteration\n + JDK-8233228: Disable weak named curves by default in TLS,\n CertPath, and Signed JAR\n + JDK-8233386: Initialize NULL fields for unused decorations\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n + JDK-8233686: XML transformer uses excessive amount of memory\n + JDK-8233741: AES Countermode (AES-CTR) optimization using\n AVX512 + VAES instructions\n + JDK-8233829: javac cannot find non-ASCII module name under\n non-UTF8 environment\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with \u0027Narrow klass base:\n 0x0000000000000000\u0027 missing from stdout/stderr\n + JDK-8234149: Several regression tests do not dispose Frame at\n end\n + JDK-8234347: \u0027Turkey\u0027 meta time zone does not generate\n composed localized names\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n + JDK-8234535: Cross compilation fails due to missing CFLAGS\n for the BUILD_CC\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n + JDK-8234687: change javap reporting on unknown attributes\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK\n 11\n + JDK-8236548: Localized time zone name inconsistency between\n English and other locales\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails when\n checking validity interval\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n + JDK-8238270: java.net HTTP/2 client does not decrease stream\n count when receives 204 response\n + JDK-8238284: [macos] Zero VM build fails due to an obvious\n typo\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388: libj2gss/NativeFunc.o \u0027multiple definition\u0027 link\n errors with GCC10\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n + JDK-8238710: LingeredApp doesn\u0027t log stdout/stderr if exits\n with non-zero code\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder-\u003eis_instance_klass() \u0026\u0026\n (!known_holder-\u003eis_interface() ||\n ((ciInstanceKlass*)known_holder)-\u003ehas_nonstatic_concrete_methods())),\n \u0027should be non-static concrete method\u0027);\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8240169: javadoc fails to link to non-modular api docs\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8240360: NativeLibraryEvent has wrong library name on\n Linux\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n + JDK-8241319: WB_GetCodeBlob doesn\u0027t have ResourceMark\n + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java\n fails with OOME\n + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8242184: CRL generation error with RSASSA-PSS\n + JDK-8242283: Can\u0027t start JVM when java home path includes\n non-ASCII character\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test framework\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n + JDK-8243453: java --describe-module failed with non-ASCII\n module name under non-UTF8 environment\n + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on\n HiDPI screens (Windows)\n + JDK-8244087: 2020-04-24 public suffix list update\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n + JDK-8244196: adjust output in os_linux\n + JDK-8244225: stringop-overflow warning on strncpy call from\n compile_the_world_in\n + JDK-8244287: JFR: Methods samples have line number 0\n + JDK-8244703: \u0027platform encoding not initialized\u0027 exceptions\n with debugger, JNI\n + JDK-8244719: CTW: C2 compilation fails with\n \u0027assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it\u0027\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n + JDK-8244763: Update --release 8 symbol information after JSR\n 337 MR3\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8245151: jarsigner should not raise duplicate warnings on\n verification\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n + JDK-8245714: \u0027Bad graph detected in build_loop_late\u0027 when\n loads are pinned on loop limit check uncommon branch\n + JDK-8245801: StressRecompilation triggers assert \u0027redundunt\n OSR recompilation detected. memory leak in CodeCache!\u0027\n + JDK-8245832: JDK build make-static-libs should build all JDK\n libraries\n + JDK-8245880: Shenandoah: check class unloading flag early in\n concurrent code root scan\n + JDK-8245981: Upgrade to jQuery 3.5.1\n + JDK-8246027: Minimal fastdebug build broken after JDK-8245801\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n + JDK-8246153: TestEliminateArrayCopy fails with\n -XX:+StressReflectiveCode\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest\n fails with AssertionError\n + JDK-8246203: Segmentation fault in verification due to stack\n overflow with -XX:+VerifyIterativeGVN\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n + JDK-8246453: TestClone crashes with \u0027all collected exceptions\n must come from the same place\u0027\n + JDK-8247246: Add explicit ResolvedJavaType.link and expose\n presence of default methods\n + JDK-8247350: [aarch64] assert(false) failed: wrong size of\n mach node\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n + JDK-8247615: Initialize the bytes left for the heap sampler\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV\n in SBC2Support::pin_and_expand\n + JDK-8247874: Replacement in VersionProps.java.template not\n working when --with-vendor-bug-url contains \u0027\u0026\u0027\n + JDK-8247979: aarch64: missing side effect of killing flags\n for clearArray_reg_reg\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n + JDK-8248495: [macos] zerovm is broken due to libffi headers\n location\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8248987: AOT\u0027s Linker.java seems to eagerly fail-fast on\n Windows\n + JDK-8249159: Downport test rework for SSLSocketTemplate from\n 8224650\n + JDK-8249215: JFrame::setVisible crashed with\n -Dfile.encoding=UTF-8 on Japanese Windows.\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is\n not highlighted in GTKLookAndFeel\n + JDK-8249255: Build fails if source code in cygwin home dir\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should\n account for corner cases\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when\n requesting TGS Kerberos tickets\n + JDK-8250609: C2 crash in IfNode::fold_compares\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java\n + JDK-8250787: Provider.put no longer registering aliases in\n FIPS env\n + JDK-8250826: jhsdb does not work with coredump which comes\n from Substrate VM\n + JDK-8250827: Shenandoah: needs to reset/finish StringTable\u0027s\n dead count before/after parallel walk\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check\n the bounds\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java\n test failure\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with\n I-U\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n + JDK-8251487: Shenandoah: missing detail timing tracking for\n final mark cleaning phase\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells \u0027occured\u0027\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n + JDK-8252258: [11u] JDK-8242154 changes the default vendor\n + JDK-8252804: [test] Fix \u0027ReleaseDeflater.java\u0027 test after\n downport of 8234011\n + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)\n in JDK 11\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes several\n crashes\n + Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*,\n bool)\u0027 introduced in jdk 11.0.9\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3159,SUSE-SLE-SERVER-12-SP5-2020-3159", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3159-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3159-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203159-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3159-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-11-05T09:33:03Z", "generator": { "date": "2020-11-05T09:33:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3159-1", "initial_release_date": "2020-11-05T09:33:03Z", "revision_history": [ { "date": "2020-11-05T09:33:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.15.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.15.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.15.1.aarch64", "product_id": "java-11-openjdk-src-11.0.9.0-3.15.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-demo-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-devel-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-headless-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.15.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.15.1.i586", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.15.1.i586", "product_id": "java-11-openjdk-src-11.0.9.0-3.15.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.9.0-3.15.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.9.0-3.15.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.9.0-3.15.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.15.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.15.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.15.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.9.0-3.15.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.15.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.15.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.15.1.s390x", "product_id": "java-11-openjdk-src-11.0.9.0-3.15.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.15.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.15.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.15.1.x86_64", "product_id": "java-11-openjdk-src-11.0.9.0-3.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-demo-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-devel-11.0.9.0-3.15.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-11-openjdk-headless-11.0.9.0-3.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T09:33:03Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2021:0032-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\n- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]\n CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779\n CVE-2020-14798 CVE-2020-14796 CVE-2020-14803\n * Class libraries:\n - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time\n that the set timeout\n - Z/OS specific C function send_file is changing the file pointer\n position\n * Java Virtual Machine:\n - Crash on iterate java stack\n - Java process hang on SIGTERM\n * JIT Compiler:\n - JMS performance regression from JDK8 SR5 FP40 TO FP41\n\n * Class Libraries:\n - z15 high utilization following Z/VM and Linux migration from\n z14 To z15\n * Java Virtual Machine:\n - Assertion failed when trying to write a class file\n - Assertion failure at modronapi.cpp\n - Improve the performance of defining and finding classes\n * JIT Compiler:\n - An assert in ppcbinaryencoding.cpp may trigger when running\n with traps disabled on power\n - AOT field offset off by n bytes\n - Segmentation fault in jit module on ibm z platform", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2021-32,SUSE-2021-32,SUSE-OpenStack-Cloud-7-2021-32,SUSE-OpenStack-Cloud-8-2021-32,SUSE-OpenStack-Cloud-9-2021-32,SUSE-OpenStack-Cloud-Crowbar-8-2021-32,SUSE-OpenStack-Cloud-Crowbar-9-2021-32,SUSE-SLE-SAP-12-SP2-2021-32,SUSE-SLE-SAP-12-SP3-2021-32,SUSE-SLE-SAP-12-SP4-2021-32,SUSE-SLE-SDK-12-SP5-2021-32,SUSE-SLE-SERVER-12-SP2-2021-32,SUSE-SLE-SERVER-12-SP2-BCL-2021-32,SUSE-SLE-SERVER-12-SP3-2021-32,SUSE-SLE-SERVER-12-SP3-BCL-2021-32,SUSE-SLE-SERVER-12-SP4-LTSS-2021-32,SUSE-SLE-SERVER-12-SP5-2021-32,SUSE-Storage-5-2021-32", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0032-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:0032-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210032-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:0032-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE Bug 1180063", "url": "https://bugzilla.suse.com/1180063" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2021-01-05T15:21:38Z", "generator": { "date": "2021-01-05T15:21:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:0032-1", "initial_release_date": "2021-01-05T15:21:38Z", "revision_history": [ { "date": "2021-01-05T15:21:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr6.20-30.78.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr6.20-30.78.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-01-05T15:21:38Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:3191-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*, bool)\u0027,\n introduced in October 2020 CPU.\n\n- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\n bsc#1174157, and October 2020 CPU, bsc#1177943)\n * New features\n + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7\n + PR3796: Allow the number of curves supported to be specified\n * Security fixes\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in\n sun.security.util.DerInputStream.getUnalignedBitString()\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233255: Better Swing Buttons\n + JDK-8233624: Enhance JNI linkage\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240124: Better VM Interning\n + JDK-8240482: Improved WAV file playback\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Import of OpenJDK 8 u262 build 01\n + JDK-4949105: Access Bridge lacks html tags parsing\n + JDK-8003209: JFR events for network utilization\n + JDK-8030680: 292 cleanup from default method code assessment\n + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java\n and some tests failed on windows intermittently\n + JDK-8041626: Shutdown tracing event\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n + JDK-8149338: JVM Crash caused by Marlin renderer not handling\n NaN coordinates\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to \u0027Connection\n succeeded\u0027\n + JDK-8165675: Trace event for thread park has incorrect unit\n for timeout\n + JDK-8176182: 4 security tests are not run\n + JDK-8178910: Problemlist sample tests\n + JDK-8183925: Decouple crash protection from watcher thread\n + JDK-8191393: Random crashes during cfree+0x1c\n + JDK-8195817: JFR.stop should require name of recording\n + JDK-8195818: JFR.start should increase autogenerated name by\n one\n + JDK-8195819: Remove recording=x from jcmd JFR.check output\n + JDK-8199712: Flight Recorder\n + JDK-8202578: Revisit location for class unload events\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on\n missing events\n + JDK-8203287: Zero fails to build after JDK-8199712 (Flight\n Recorder)\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n + JDK-8203664: JFR start failure after AppCDS archive created\n with JFR StartFlightRecording\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n + JDK-8203929: Limit amount of data for JFR.dump\n + JDK-8205516: JFR tool\n + JDK-8207392: [PPC64] Implement JFR profiling\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first\n classloader which calls it\n + JDK-8209960: -Xlog:jfr* doesn\u0027t work with the JFR\n + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD\n 1.0.7\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n + JDK-8213015: Inconsistent settings between JFR.configure and\n -XX:FlightRecorderOptions\n + JDK-8213421: Line number information for execution samples\n always 0\n + JDK-8213617: JFR should record the PID of the recorded process\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n + JDK-8213914: [TESTBUG] Several JFR VM events are not covered\n by tests\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by\n test\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n + JDK-8214542: JFR: Old Object Sample event slow on a deep heap\n in debug builds\n + JDK-8214750: Unnecessary \u003cp\u003e tags in jfr classes\n + JDK-8214896: JFR Tool left files behind\n + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java\n fails with UnsatisfiedLinkError\n + JDK-8214925: JFR tool fails to execute\n + JDK-8215175: Inconsistencies in JFR event metadata\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n + JDK-8215355: Object monitor deadlock with no threads holding\n the monitor (using jemalloc 5.1)\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n + JDK-8215771: The jfr tool should pretty print reference chains\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn\u0027t work\n properly\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n + JDK-8216559: [JFR] Native libraries not correctly parsed from\n /proc/self/maps\n + JDK-8216578: Remove unused/obsolete method in JFR code\n + JDK-8216995: Clean up JFR command line processing\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some\n systems due to process surviving SIGINT\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR\n TestShutdownEvent\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n + JDK-8223147: JFR Backport\n + JDK-8223689: Add JFR Thread Sampling Support\n + JDK-8223690: Add JFR BiasedLock Event Support\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n + JDK-8224475: JTextPane does not show images in HTML rendering\n + JDK-8226253: JAWS reports wrong number of radio buttons when\n buttons are hidden.\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n + JDK-8226892: ActionListeners on JRadioButtons don\u0027t get\n notified when selection is changed with arrow keys\n + JDK-8227011: Starting a JFR recording in response to JVMTI\n VMInit and / or Java agent premain corrupts memory\n + JDK-8227605: Kitchensink fails \u0027assert((((klass)-\u003etrace_id()\n \u0026 (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant\u0027\n + JDK-8229366: JFR backport allows unchecked writing to memory\n + JDK-8229401: Fix JFR code cache test failures\n + JDK-8229708: JFR backport code does not initialize\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on\n Windows\n + JDK-8230707: JFR related tests are failing\n + JDK-8230782: Robot.createScreenCapture() fails if\n \u0027awt.robot.gtk\u0027 is set to false\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on\n unix misses ReleaseStringUTFChars in early return\n + JDK-8230947: TestLookForUntestedEvents.java is failing after\n JDK-8230707\n + JDK-8231995: two jtreg tests failed after 8229366 is fixed\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n + JDK-8236002: CSR for JFR backport suggests not leaving out\n the package-info\n + JDK-8236008: Some backup files were accidentally left in the\n hotspot tree\n + JDK-8236074: Missed package-info\n + JDK-8236174: Should update javadoc since tags\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when\n there are external FIPS modules in the NSSDB\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n + JDK-8238590: Enable JFR by default during compilation in 8u\n + JDK-8239055: Wrong implementation of VMState.hasListener\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n + JDK-8239479: minimal1 and zero builds are failing\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n + JDK-8240375: Disable JFR by default for July 2020 release\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n * Import of OpenJDK 8 u262 build 02\n + JDK-8130737: AffineTransformOp can\u0027t handle child raster with\n non-zero x-offset\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation\n in java/awt/image/Raster/TestChildRasterOp.java\n + JDK-8230926: [macosx] Two apostrophes are entered instead of\n one with \u0027U.S. International - PC\u0027 layout\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n + JDK-8242883: Incomplete backport of JDK-8078268: backport\n test part\n * Import of OpenJDK 8 u262 build 03\n + JDK-8037866: Replace the Fun class in tests with lambdas\n + JDK-8146612: C2: Precedence edges specification violated\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects HPROF\n JAVA PROFILE 1.0.1 file format\n + JDK-8229888: (zipfs) Updating an existing zip file does not\n preserve original permissions\n + JDK-8230597: Update GIFlib library to the 5.2.1\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n + JDK-8233880, PR3798: Support compilers with multi-digit major\n version numbers\n + JDK-8239852: java/util/concurrent tests fail with\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:\n verification should have failed\n + JDK-8241638: launcher time metrics always report 1 on Linux\n when _JAVA_LAUNCHER_DEBUG set\n + JDK-8243059: Build fails when --with-vendor-name contains a\n comma\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n * Import of OpenJDK 8 u262 build 04\n + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn\u0027t\n throw NPE if timeout is less than, or equal to zero when unit\n == null\n + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()\n does not recognize OpenJDK\u0027s HotSpot VM\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n + JDK-8243539: Copyright info (Year) should be updated for fix\n of 8241638\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash value\n * Import of OpenJDK 8 u262 build 05\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn\u0027t run in agentvm mode\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n + JDK-8181841: A TSA server returns timestamp with precision\n higher than milliseconds\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n + JDK-8236996: Incorrect Roboto font rendering on Windows with\n subpixel antialiasing\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n + JDK-8244843: JapanEraNameCompatTest fails\n * Import of OpenJDK 8 u262 build 06\n + JDK-8246223: Windows build fails after JDK-8227269\n * Import of OpenJDK 8 u262 build 07\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and\n Jfr:on_vm_start() start-up order for correct option parsing\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n + JDK-8245167: Top package in method profiling shows null in JMC\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n * Import of OpenJDK 8 u262 build 08\n + JDK-8220293: Deadlock in JFR string pool\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n + JDK-8225069: Remove Comodo root certificate that is expiring\n in May 2020\n * Import of OpenJDK 8 u262 build 09\n + JDK-8248399: Build installs jfr binary when JFR is disabled\n * Import of OpenJDK 8 u262 build 10\n + JDK-8248715: New JavaTimeSupplementary localisation for \u0027in\u0027\n installed in wrong package\n * Import of OpenJDK 8 u265 build 01\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n + JDK-8250546: Expect changed behaviour reported in JDK-8249846\n * Import of OpenJDK 8 u272 build 01\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n + JDK-8075774: Small readability and performance improvements\n for zipfs\n + JDK-8132206: move ScanTest.java into OpenJDK\n + JDK-8132376: Add @requires os.family to the client tests with\n access to internal OS-specific API\n + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n + JDK-8165936: Potential Heap buffer overflow when seaching\n timezone info files\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n + JDK-8167300: Scheduling failures during gcm should be fatal\n + JDK-8167615: Opensource unit/regression tests for JavaSound\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n + JDK-8177628: Opensource unit/regression tests for ImageIO\n + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java\n + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n + JDK-8193137: Nashorn crashes when given an empty script file\n + JDK-8194298: Add support for per Socket configuration of TCP\n keepalive\n + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java\n throws error\n + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java\n fails\n + JDK-8210147: adjust some WSAGetLastError usages in windows\n network coding\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n + JDK-8217647: JFR: recordings on 32-bit systems unreadable\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8230303: JDB hangs when running monitor command\n + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)\n return NULL if n is not in the CG\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n + JDK-8235325: build failure on Linux after 8235243\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink\n + JDK-8237951: CTW: C2 compilation fails with \u0027malformed\n control flow\u0027\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8239819: XToolkit: Misread of screen information memory\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n + JDK-8242498: Invalid \u0027sun.awt.TimedWindowEvent\u0027 object leads\n to JVM crash\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n + JDK-8246384: Enable JFR by default on supported architectures\n for October 2020 release\n + JDK-8248643: Remove extra leading space in JDK-8240295 8u\n backport\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String... keys)\n method public\n * Import of OpenJDK 8 u272 build 02\n + JDK-8023697: failed class resolution reports different class\n name in detail message for the first and subsequent times\n + JDK-8025886: replace [[ and == bash extensions in regtest\n + JDK-8046274: Removing dependency on jakarta-regexp\n + JDK-8048933: -XX:+TraceExceptions output should include the\n message\n + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/\n /fileaccess/FontFile.java fails\n + JDK-8148854: Class names \u0027SomeClass\u0027 and \u0027LSomeClass;\u0027\n treated by JVM as an equivalent\n + JDK-8154313: Generated javadoc scattered all over the place\n + JDK-8163251: Hard coded loop limit prevents reading of smart\n card data greater than 8k\n + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java\n fails with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n + JDK-8201633: Problems with AES-GCM native acceleration\n + JDK-8211049: Second parameter of \u0027initialize\u0027 method is not\n used\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n + JDK-8220555: JFR tool shows potentially misleading message\n when it cannot access a file\n + JDK-8224217: RecordingInfo should use textual representation\n of path\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/\n /SctpNet.c \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o \u0027multiple\n definition\u0027 link errors with GCC10\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n * Import of OpenJDK 8 u272 build 03\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n + JDK-8148754: C2 loop unrolling fails due to unexpected graph\n shape\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests\n fail with error : revokeall.exe: Permission denied\n + JDK-8203357: Container Metrics\n + JDK-8209113: Use WeakReference for lastFontStrike for created\n Fonts\n + JDK-8216283: Allow shorter method sampling interval than 10 ms\n + JDK-8221569: JFR tool produces incorrect output when both\n --categories and --events are specified\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8250875: Incorrect parameter type for update_number in\n JDK_Version::jdk_update\n * Import of OpenJDK 8 u272 build 04\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws\n IllegalArgumentException for flags of type double\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n + JDK-8217878: ENVELOPING XML signature no longer works in JDK\n 11\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n * Import of OpenJDK 8 u272 build 05\n + JDK-8026236: Add PrimeTest for BigInteger\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n + JDK-8152077: (cal) Calendar.roll does not always roll the\n hours during daylight savings\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n + JDK-8211163: UNIX version of Java_java_io_Console_echo does\n not return a clean boolean\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in\n docker container only works with debug JVMs\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n * Import of OpenJDK 8 u272 build 06\n + JDK-8064319: Need to enable -XX:+TraceExceptions in release\n builds\n + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11\n v2.40 support\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()\n not working\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface\n license\n + JDK-8184762: ZapStackSegments should use optimized memset\n + JDK-8193234: When using -Xcheck:jni an internally allocated\n buffer can leak\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n + JDK-8220313: [TESTBUG] Update base image for Docker testing\n to OL 7.6\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8225695: 32-bit build failures after JDK-8080462 (Update\n SunPKCS11 provider with PKCS11 v2.40 support)\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension property\n name\n + JDK-8238898, PR3801: Missing hash characters for header on\n license file\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n + JDK-8245469: Remove DTLS protocol implementation\n + JDK-8245470: Fix JDK8 compatibility issues\n + JDK-8245471: Revert JDK-8148188\n + JDK-8245472: Backport JDK-8038893 to JDK8\n + JDK-8245473: OCSP stapling support\n + JDK-8245474: Add TLS_KRB5 cipher suites support according to\n RFC-2712\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n + JDK-8245477: Adjust TLS tests location\n + JDK-8245653: Remove 8u TLS tests\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is\n set to either true or false\n + JDK-8251341: Minimal Java specification change\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n * Import of OpenJDK 8 u272 build 07\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n * Import of OpenJDK 8 u272 build 08\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8252573: 8u: Windows build failed after 8222079 backport\n * Import of OpenJDK 8 u272 build 09\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n * Import of OpenJDK 8 u272 build 10\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed\n by the fix for JDK-8249158\n + JDK-8254937: Revert JDK-8148854 for 8u272\n * Backports\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several\n client tests unaffected by the automated bulk update\n + JDK-8144015, PR3806: [PIT] failures of text layout font tests\n + JDK-8144023, PR3806: [PIT] failure of text measurements in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.java\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8145542, PR3806: The case failed automatically and thrown\n java.lang.ArrayIndexOutOfBoundsException exception\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when\n displaying Devanagari text in JEditorPane\n + JDK-8152358, PR3800: code and comment cleanups found during\n the hunt for 8077392\n + JDK-8152545, PR3804: Use preprocessor instead of compiling a\n program to generate native nio constants\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation failed\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n + JDK-8191522, PR3806: Remove Bigelow\u0026Holmes Lucida fonts from\n JDK sources\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n * Bug fixes\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a \u0027%s\u0027 directive\n + PR3795: ECDSAUtils for XML digital signatures should support\n the same curve set as the rest of the JDK\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n + PR3808: IcedTea does not install the JFR *.jfc files\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has\n fixed its use with Shenandoah\n + PR3811: Don\u0027t attempt to install JFR files when JFR is\n disabled\n * Shenandoah\n + [backport] 8221435: Shenandoah should not mark through weak\n roots\n + [backport] 8221629: Shenandoah: Cleanup class unloading logic\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n + [backport] 8223215: Shenandoah: Support verifying subset of\n roots\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache roots\n + [backport] 8224508: Shenandoah: Need to update thread roots\n in final mark for piggyback ref update cycle\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n --disable-precompiled-headers\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n + [backport] 8224751: Shenandoah: Shenandoah Verifier should\n select proper roots according to current GC cycle\n + [backport] 8225014: Separate ShenandoahRootScanner method for\n object_iterate\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn\u0027t\n work for Shenandoah\n + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to\n ensure roots to-space invariant\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n + [backport] 8226413: Shenandoah: Separate root scanner for\n SH::object_iterate()\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n + [backport] 8231198: Shenandoah: heap walking should visit all\n roots most of the time\n + [backport] 8231244: Shenandoah: all-roots heap walking misses\n some weak roots\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n + [backport] 8239786: Shenandoah: print per-cycle statistics\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod\u0027s metadata\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n + [backport] 8240750: Shenandoah: remove leftover files and\n mentions of ShenandoahAllocTracker\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n + [backport] 8240872: Shenandoah: Avoid updating new regions\n from start of evacuation\n + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers\n + [backport] 8240915: Shenandoah: Remove unused fields in init\n mark tasks\n + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects\n paths after JDK-8240868\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + [backport] 8241062: Shenandoah: rich asserts trigger \u0027empty\n statement\u0027 inspection\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n + [backport] 8241093: Shenandoah: editorial changes in flag\n descriptions\n + [backport] 8241139: Shenandoah: distribute mark-compact work\n exactly to minimize fragmentation\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n + [backport] 8241351: Shenandoah: fragmentation metrics overhaul\n + [backport] 8241435: Shenandoah: avoid disabling pacing with\n \u0027aggressive\u0027\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n + [backport] 8241534: Shenandoah: region status should include\n update watermark\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n + [backport] 8241583: Shenandoah: turn heap lock asserts into\n macros\n + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not\n derive from ContiguousSpace\n + [backport] 8241673: Shenandoah: refactor anti-false-sharing\n padding\n + [backport] 8241675: Shenandoah: assert(n-\u003eoutcnt() \u003e 0) at\n shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n + [backport] 8241748: Shenandoah: inline MarkingContext TAMS\n methods\n + [backport] 8241838: Shenandoah: no need to trash cset during\n final mark\n + [backport] 8241841: Shenandoah: ditch one of allocation type\n counters in ShenandoahHeapRegion\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions\n to cache lines\n + [backport] 8241926: Shenandoah: only print heap changes for\n operations that directly affect it\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n + [backport] 8241985: Shenandoah: simplify collectable garbage\n logging\n + [backport] 8242040: Shenandoah: print allocation failure type\n + [backport] 8242041: Shenandoah: adaptive heuristics should\n account evac reserve in free target\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n + [backport] 8242054: Shenandoah: New incremental-update mode\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n + [backport] 8242083: Shenandoah: split \u0027Prepare Evacuation\u0027\n tracking into cset/freeset counters\n + [backport] 8242089: Shenandoah: per-worker stats should be\n summed up, not averaged\n + [backport] 8242101: Shenandoah: coalesce and parallelise heap\n region walks during the pauses\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier\n dispatching\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n + [backport] 8242227: Shenandoah: transit regions to cset state\n when adding to collection set\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion\n liveness-related methods\n + [backport] 8242267: Shenandoah: regions space needs to be\n aligned by os::vm_allocation_granularity()\n + [backport] 8242271: Shenandoah: add test to verify GC mode\n unlock\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n + [backport] 8242316: Shenandoah: Turn NULL-check into assert\n in SATB slow-path entry\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n + [backport] 8242641: Shenandoah: clear live data and update\n TAMS optimistically\n + [backport] 8243238: Shenandoah: explicit GC request should\n wait for a complete GC cycle\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n + [backport] 8243463: Shenandoah: ditch total_pause counters\n + [backport] 8243464: Shenandoah: print statistic counters in\n time order\n + [backport] 8243465: Shenandoah: ditch unused pause_other,\n conc_other counters\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n + [backport] 8243494: Shenandoah: set counters once per cycle\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n + [backport] 8243848: Shenandoah: Windows build fails after\n JDK-8239786\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n + [backport] 8244226: Shenandoah: per-cycle statistics contain\n worker data from previous cycles\n + [backport] 8244326: Shenandoah: global statistics should not\n accept bogus samples\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state\n takes loop for wrong control\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the heuristics\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n + [backport] 8244739: Shenandoah: break superclass dependency\n on ShenandoahNormalMode\n + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode\n to ShenandoahSATBMode\n + [backport] 8245461: Shenandoah: refine mode name()-s\n + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings\n constructor arguments\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n + [backport] 8245465: Shenandoah: test_in_cset can use more\n efficient encoding\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should not\n disable heap resizing or uncommits\n + [backport] 8245773: Shenandoah: Windows assertion failure\n after JDK-8245464\n + [backport] 8245812: Shenandoah: compute root phase parallelism\n + [backport] 8245814: Shenandoah: reconsider format specifiers\n for stats\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n + [backport] 8246162: Shenandoah: full GC does not mark code\n roots when class unloading is off\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n + [backport] 8247358: Shenandoah: reconsider free budget slice\n for marking\n + [backport] 8247367: Shenandoah: pacer should wait on lock\n instead of exponential backoff\n + [backport] 8247474: Shenandoah: Windows build warning after\n JDK-8247310\n + [backport] 8247560: Shenandoah: heap iteration holds root\n locks all the time\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n + [backport] 8247751: Shenandoah: options tests should run with\n smaller heaps\n + [backport] 8247754: Shenandoah: mxbeans tests can be shorter\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n + [backport] 8247860: Shenandoah: add update watermark line in\n rich assert failure message\n + [backport] 8248041: Shenandoah: pre-Full GC root updates may\n miss some roots\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n + [backport] 8249560: Shenandoah: Fix racy GC request handling\n + [backport] 8249649: Shenandoah: provide per-cycle pacing stats\n + [backport] 8249801: Shenandoah: Clear soft-refs on requested\n GC cycle\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n + Fix slowdebug build after JDK-8230853 backport\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n + Shenandoah: add root statistics for string dedup table/queues\n + Shenandoah: enable low-frequency STW class unloading\n + Shenandoah: fix build failures after JDK-8244737 backport\n + Shenandoah: Fix build failure with +JFR -PCH\n + Shenandoah: fix forceful pacer claim\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n + Shenandoah: fix runtime linking failure due to non-compiled\n shenandoahBarrierSetC1\n + Shenandoah: hook statistics printing to PrintGCDetails, not\n PrintGC\n + Shenandoah: JNI weak roots are always cleared before Full GC\n mark\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n + Shenandoah: move barrier sets to their proper locations\n + Shenandoah: move parallelCleaning.* to shenandoah/\n + Shenandoah: pacer should use proper Atomics for intptr_t\n + Shenandoah: properly deallocates class loader metadata\n + Shenandoah: specialize String Table scans for better pause\n performance\n + Shenandoah: Zero build fails after recent Atomic cleanup in\n Pacer\n * AArch64 port\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java\n generates guarantee failure in C1\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection from\n watcher thread\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n + JDK-8203481, PR3797: Incorrect constraint for unextended_sp\n in frame:safe_for_sender\n + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall\n fails with SIGILL on aarch64\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command\n + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java\n fails on AArch64\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()\n does not check for zero length on AARCH64\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n + JDK-8221658, PR3797: aarch64: add necessary predicate for\n ubfx patterns\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n + JDK-8247979, PR3797: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\n- Ignore whitespaces after the header or footer in PEM X.509 cert\n (bsc#1171352)\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-3191,SUSE-2020-3191,SUSE-OpenStack-Cloud-7-2020-3191,SUSE-OpenStack-Cloud-8-2020-3191,SUSE-OpenStack-Cloud-9-2020-3191,SUSE-OpenStack-Cloud-Crowbar-8-2020-3191,SUSE-OpenStack-Cloud-Crowbar-9-2020-3191,SUSE-SLE-SAP-12-SP2-2020-3191,SUSE-SLE-SAP-12-SP3-2020-3191,SUSE-SLE-SAP-12-SP4-2020-3191,SUSE-SLE-SERVER-12-SP2-2020-3191,SUSE-SLE-SERVER-12-SP2-BCL-2020-3191,SUSE-SLE-SERVER-12-SP3-2020-3191,SUSE-SLE-SERVER-12-SP3-BCL-2020-3191,SUSE-SLE-SERVER-12-SP4-LTSS-2020-3191,SUSE-SLE-SERVER-12-SP5-2020-3191,SUSE-Storage-5-2020-3191", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3191-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3191-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203191-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3191-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" }, { "category": "self", "summary": "SUSE Bug 1171352", "url": "https://bugzilla.suse.com/1171352" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2020-11-05T16:40:00Z", "generator": { "date": "2020-11-05T16:40:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3191-1", "initial_release_date": "2020-11-05T16:40:00Z", "revision_history": [ { "date": "2020-11-05T16:40:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-27.48.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-27.48.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.272-27.48.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-27.48.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-27.48.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Enterprise Storage 5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-demo-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-devel-1.8.0.272-27.48.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:java-1_8_0-openjdk-headless-1.8.0.272-27.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-05T16:40:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
suse-su-2020:3359-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,\n bsc#1177943)\n * New features\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector\n * Security fixes\n + JDK-8233624: Enhance JNI linkage\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8240124: Better VM Interning\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Other changes\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite loop\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed\n + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with Address\n already in use\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8172404: Tools should warn if weak algorithms are used\n before restricting them\n + JDK-8193367: Annotated type variable bounds crash javac\n + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java\n fails intermittently: Connection reset\n + JDK-8203026: java.rmi.NoSuchObjectException: no such object\n in table\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n + JDK-8204963: javax.swing.border.TitledBorder has a memory leak\n + JDK-8204994: SA might fail to attach to process with \u0027Windbg\n Error: WaitForEvent failed\u0027\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n + JDK-8206309: Tier1 SA tests fail\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java\n version - step1\n + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh\n is incorrect\n + JDK-8209342: Problemlist SA tests on Solaris due to Error\n attaching to process: Can\u0027t create thread_db agent!\n + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java\n should be marked as headful\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with\n timeout\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java\n version - step2\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with\n ZGC\n + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java\n + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error code\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java\n version - step3\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related\n tests\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails\n with waitForPrompt timed out after 60 seconds\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should\n clarify which output is the pending reply after a timeout\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java\n version - step4\n + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java\n fails to find ThreadLocalObject\n + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh\n test\n + JDK-8211694: JShell: Redeclared variable should be reset\n + JDK-8212200: assert when shared java.lang.Object is redefined\n by JVMTI agent\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)\n - unexpected. lastLine=52, minLine=52, maxLine=55\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by JVMTI\n agent)\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n + JDK-8213574: Deadlock in string table expansion when dumping\n lots of CDS classes\n + JDK-8213703: LambdaConversionException: Invalid receiver type\n not a subtype of implementation type interface\n + JDK-8214074: Ghash optimization using AVX instructions\n + JDK-8214491: Upgrade to JLine 3.9.0\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n + JDK-8215243: JShell tests failing intermitently with\n \u0027Problem cleaning up the following threads:\u0027\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash\n optimization using AVX instructions)\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n + JDK-8216021: RunTest.gmk might set concurrency level to 1 on\n Windows\n + JDK-8216974: HttpConnection not returned to the pool after\n 204 response\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are not\n reflected correctly during run time\n + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is\n too small on new Skylake CPUs\n + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs\n instead of aliased B\u0026W glyphs\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n + JDK-8221759: Crash when completing \u0027java.io.File.path\u0027\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not found\n + JDK-8222074: Enhance auto vectorization for x86\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely\n on hostname command\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n + JDK-8223940: Private key not supported by chosen signature\n algorithm\n + JDK-8224184: jshell got IOException at exiting with AIX\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails in\n test_mulc\n + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws\n NullPointerException\n + JDK-8225625: AES Electronic Codebook (ECB) encryption and\n decryption optimization using AVX512 + VAES instructions\n + JDK-8226536: Catch OOM from deopt that fails rematerializing\n objects\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java\n fails due to \u0027exitValue = 6\u0027\n + JDK-8228448: Jconsole can\u0027t connect to itself\n + JDK-8228967: Trust/Key store and SSL context utilities for\n tests\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8229815: Upgrade Jline to 3.12.1\n + JDK-8230000: some httpclients testng tests run zero test\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n + JDK-8230402: Allocation of compile task fails with assert:\n \u0027Leaking compilation tasks?\u0027\n + JDK-8230767: FlightRecorderListener returns null recording\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to\n test/jdk/java/util/zip/EntryCount64k.java\n + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()\n can be quicker for self thread\n + JDK-8231586: enlarge encoding space for OopMapValue offsets\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n + JDK-8232161: Align some one-way conversion in MS950 charset\n with Windows\n + JDK-8232855: jshell missing word in /help help\n + JDK-8233027: OopMapSet::all_do does oms.next() twice during\n iteration\n + JDK-8233228: Disable weak named curves by default in TLS,\n CertPath, and Signed JAR\n + JDK-8233386: Initialize NULL fields for unused decorations\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n + JDK-8233686: XML transformer uses excessive amount of memory\n + JDK-8233741: AES Countermode (AES-CTR) optimization using\n AVX512 + VAES instructions\n + JDK-8233829: javac cannot find non-ASCII module name under\n non-UTF8 environment\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with \u0027Narrow klass base:\n 0x0000000000000000\u0027 missing from stdout/stderr\n + JDK-8234149: Several regression tests do not dispose Frame at\n end\n + JDK-8234347: \u0027Turkey\u0027 meta time zone does not generate\n composed localized names\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n + JDK-8234535: Cross compilation fails due to missing CFLAGS\n for the BUILD_CC\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n + JDK-8234687: change javap reporting on unknown attributes\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK\n 11\n + JDK-8236548: Localized time zone name inconsistency between\n English and other locales\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails when\n checking validity interval\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n + JDK-8238270: java.net HTTP/2 client does not decrease stream\n count when receives 204 response\n + JDK-8238284: [macos] Zero VM build fails due to an obvious\n typo\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388: libj2gss/NativeFunc.o \u0027multiple definition\u0027 link\n errors with GCC10\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n + JDK-8238710: LingeredApp doesn\u0027t log stdout/stderr if exits\n with non-zero code\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder-\u003eis_instance_klass() \u0026\u0026\n (!known_holder-\u003eis_interface() ||\n ((ciInstanceKlass*)known_holder)-\u003ehas_nonstatic_concrete_methods())),\n \u0027should be non-static concrete method\u0027);\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8240169: javadoc fails to link to non-modular api docs\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8240360: NativeLibraryEvent has wrong library name on\n Linux\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n + JDK-8241319: WB_GetCodeBlob doesn\u0027t have ResourceMark\n + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java\n fails with OOME\n + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8242184: CRL generation error with RSASSA-PSS\n + JDK-8242283: Can\u0027t start JVM when java home path includes\n non-ASCII character\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test framework\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n + JDK-8243453: java --describe-module failed with non-ASCII\n module name under non-UTF8 environment\n + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on\n HiDPI screens (Windows)\n + JDK-8244087: 2020-04-24 public suffix list update\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n + JDK-8244196: adjust output in os_linux\n + JDK-8244225: stringop-overflow warning on strncpy call from\n compile_the_world_in\n + JDK-8244287: JFR: Methods samples have line number 0\n + JDK-8244703: \u0027platform encoding not initialized\u0027 exceptions\n with debugger, JNI\n + JDK-8244719: CTW: C2 compilation fails with\n \u0027assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it\u0027\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n + JDK-8244763: Update --release 8 symbol information after JSR\n 337 MR3\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8245151: jarsigner should not raise duplicate warnings on\n verification\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n + JDK-8245714: \u0027Bad graph detected in build_loop_late\u0027 when\n loads are pinned on loop limit check uncommon branch\n + JDK-8245801: StressRecompilation triggers assert \u0027redundunt\n OSR recompilation detected. memory leak in CodeCache!\u0027\n + JDK-8245832: JDK build make-static-libs should build all JDK\n libraries\n + JDK-8245880: Shenandoah: check class unloading flag early in\n concurrent code root scan\n + JDK-8245981: Upgrade to jQuery 3.5.1\n + JDK-8246027: Minimal fastdebug build broken after JDK-8245801\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n + JDK-8246153: TestEliminateArrayCopy fails with\n -XX:+StressReflectiveCode\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest\n fails with AssertionError\n + JDK-8246203: Segmentation fault in verification due to stack\n overflow with -XX:+VerifyIterativeGVN\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n + JDK-8246453: TestClone crashes with \u0027all collected exceptions\n must come from the same place\u0027\n + JDK-8247246: Add explicit ResolvedJavaType.link and expose\n presence of default methods\n + JDK-8247350: [aarch64] assert(false) failed: wrong size of\n mach node\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n + JDK-8247615: Initialize the bytes left for the heap sampler\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV\n in SBC2Support::pin_and_expand\n + JDK-8247874: Replacement in VersionProps.java.template not\n working when --with-vendor-bug-url contains \u0027\u0026\u0027\n + JDK-8247979: aarch64: missing side effect of killing flags\n for clearArray_reg_reg\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n + JDK-8248495: [macos] zerovm is broken due to libffi headers\n location\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8248987: AOT\u0027s Linker.java seems to eagerly fail-fast on\n Windows\n + JDK-8249159: Downport test rework for SSLSocketTemplate from\n 8224650\n + JDK-8249215: JFrame::setVisible crashed with\n -Dfile.encoding=UTF-8 on Japanese Windows.\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is\n not highlighted in GTKLookAndFeel\n + JDK-8249255: Build fails if source code in cygwin home dir\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should\n account for corner cases\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when\n requesting TGS Kerberos tickets\n + JDK-8250609: C2 crash in IfNode::fold_compares\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java\n + JDK-8250787: Provider.put no longer registering aliases in\n FIPS env\n + JDK-8250826: jhsdb does not work with coredump which comes\n from Substrate VM\n + JDK-8250827: Shenandoah: needs to reset/finish StringTable\u0027s\n dead count before/after parallel walk\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check\n the bounds\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java\n test failure\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with\n I-U\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n + JDK-8251487: Shenandoah: missing detail timing tracking for\n final mark cleaning phase\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells \u0027occured\u0027\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n + JDK-8252258: [11u] JDK-8242154 changes the default vendor\n + JDK-8252804: [test] Fix \u0027ReleaseDeflater.java\u0027 test after\n downport of 8234011\n + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)\n in JDK 11\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes several\n crashes\n + Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*,\n bool)\u0027 introduced in jdk 11.0.9\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-3359,SUSE-SLE-Module-Basesystem-15-SP1-2020-3359,SUSE-SLE-Module-Basesystem-15-SP2-2020-3359,SUSE-SLE-Module-Packagehub-Subpackages-15-SP1-2020-3359,SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2020-3359", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_3359-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:3359-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20203359-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:3359-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-11-17T12:19:11Z", "generator": { "date": "2020-11-17T12:19:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:3359-1", "initial_release_date": "2020-11-17T12:19:11Z", "revision_history": [ { "date": "2020-11-17T12:19:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.48.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.48.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.48.1.aarch64", "product_id": "java-11-openjdk-src-11.0.9.0-3.48.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-demo-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-devel-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-headless-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.48.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.48.1.i586", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.48.1.i586", "product_id": "java-11-openjdk-src-11.0.9.0-3.48.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.48.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.48.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.48.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.9.0-3.48.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.48.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.48.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.48.1.s390x", "product_id": "java-11-openjdk-src-11.0.9.0-3.48.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.9.0-3.48.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-3.48.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.9.0-3.48.1.x86_64", "product_id": "java-11-openjdk-src-11.0.9.0-3.48.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP1", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP1", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP2", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-demo-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-devel-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:java-11-openjdk-headless-11.0.9.0-3.48.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15 SP1:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch", "SUSE Linux Enterprise Module for Package Hub 15 SP2:java-11-openjdk-javadoc-11.0.9.0-3.48.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T12:19:11Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
wid-sec-w-2023-0016
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Tivoli Monitoring ist eine System\u00fcberwachungs-Software zum Managen von Betriebssystemen, Datenbanken und Servern in verteilten und Host-Umgebungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Tivoli Monitoring ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0016 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0016.json" }, { "category": "self", "summary": "WID-SEC-2023-0016 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0016" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6587154" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6472877" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6466307" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6466303" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6438833" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6376752" }, { "category": "external", "summary": "IBM Security Bulletin vom 2023-01-03", "url": "https://www.ibm.com/support/pages/node/6252467" } ], "source_lang": "en-US", "title": "IBM Tivoli Monitoring: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-03T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:40:42.367+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0016", "initial_release_date": "2023-01-03T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-03T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0", "product": { "name": "IBM Tivoli Monitoring 6.3.0", "product_id": "307523", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.1", "product": { "name": "IBM Tivoli Monitoring 6.3.0.1", "product_id": "307524", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.1" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.2", "product": { "name": "IBM Tivoli Monitoring 6.3.0.2", "product_id": "307525", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.2" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.3", "product": { "name": "IBM Tivoli Monitoring 6.3.0.3", "product_id": "307526", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.3" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.4", "product": { "name": "IBM Tivoli Monitoring 6.3.0.4", "product_id": "307527", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.4" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.5", "product": { "name": "IBM Tivoli Monitoring 6.3.0.5", "product_id": "342006", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.5" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.6", "product": { "name": "IBM Tivoli Monitoring 6.3.0.6", "product_id": "342007", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.6" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring 6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } }, { "category": "product_name", "name": "IBM Tivoli Monitoring for Virtual Environments", "product": { "name": "IBM Tivoli Monitoring for Virtual Environments", "product_id": "T025737", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:::for_virtual_environments" } } } ], "category": "product_name", "name": "Tivoli Monitoring" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22965", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2022-22965" }, { "cve": "CVE-2021-2161", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2021-2161" }, { "cve": "CVE-2020-2830", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2830" }, { "cve": "CVE-2020-2805", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2803", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2800", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2781", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2773", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2757", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2756", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2755", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2754", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2754" }, { "cve": "CVE-2020-27221", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-27221" }, { "cve": "CVE-2020-2654", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2601", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2590", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-2590" }, { "cve": "CVE-2020-14803", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14803" }, { "cve": "CVE-2020-14798", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14797", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14796", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14792", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14782", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14781", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14779", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14621", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14593", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14583", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14581", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14579", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14578", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14577", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14556", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2020-14556" }, { "cve": "CVE-2019-2949", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2019-2949" }, { "cve": "CVE-2019-17639", "notes": [ { "category": "description", "text": "In IBM Tivoli Monitoring existieren mehrere Schwachstellen in den genutzten Java und Spring Framework Komponenten. Ein Angreifer kann dies ausnutzen, um die Kontrolle \u00fcber das System zu erlangen, vertrauliche Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, sowie weitere nicht spezifizierte Auswirkungen zu ereichen." } ], "product_status": { "known_affected": [ "T025737", "307527", "307524", "307523", "307526", "307525", "342008", "342007", "342006" ] }, "release_date": "2023-01-03T23:00:00.000+00:00", "title": "CVE-2019-17639" } ] }
wid-sec-w-2022-2242
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Verf\u00fcgbarkeit, Vertraulichkeit und Integrit\u00e4t zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Appliance\n- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2242 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2242.json" }, { "category": "self", "summary": "WID-SEC-2022-2242 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2242" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2020 - Appendix Oracle Java SE vom 2020-10-20", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixJAVA" }, { "category": "external", "summary": "October 2020 critical patch update: Corretto version 11.0.9.11.1 vom 2020-10-20", "url": "https://github.com/corretto/corretto-11/blob/release-11.0.9.11.1/CHANGELOG.md" }, { "category": "external", "summary": "Corretto version: 8.272.10.1 vom 2020-10-20", "url": "https://github.com/corretto/corretto-8/blob/release-8.272.10.1/CHANGELOG.md" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4306 vom 2020-10-22", "url": "https://access.redhat.com/errata/RHSA-2020:4306" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4305 vom 2020-10-22", "url": "https://access.redhat.com/errata/RHSA-2020:4305" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4316 vom 2020-10-22", "url": "https://access.redhat.com/errata/RHSA-2020:4316" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4307 vom 2020-10-22", "url": "https://access.redhat.com/errata/RHSA-2020:4307" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-A405EEA76A vom 2020-10-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-a405eea76a" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-421F817E5F vom 2020-10-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-421f817e5f" }, { "category": "external", "summary": "Debian Security Advisory DSA-4779 vom 2020-10-25", "url": "https://www.debian.org/security/2020/dsa-4779" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-FEBE36C3AC vom 2020-10-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-febe36c3ac" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2020-FDC79D8E5B vom 2020-10-24", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2020-fdc79d8e5b" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4350 vom 2020-10-27", "url": "https://access.redhat.com/errata/RHSA-2020:4350" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4352 vom 2020-10-26", "url": "https://access.redhat.com/errata/RHSA-2020:4352" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4347 vom 2020-10-26", "url": "https://access.redhat.com/errata/RHSA-2020:4347" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4348 vom 2020-10-27", "url": "https://access.redhat.com/errata/RHSA-2020:4348" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4349 vom 2020-10-26", "url": "https://access.redhat.com/errata/RHSA-2020:4349" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2020-134 vom 2020-10-30", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-134/index.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2412 vom 2020-10-30", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202010/msg00031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3191-1 vom 2020-11-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3159-1 vom 2020-11-05", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2020:4348 vom 2020-11-09", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-4348-Moderate-CentOS-6-java-1-8-0-openjdk-Security-Update-tp4646012.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3310-1 vom 2020-11-12", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3359-1 vom 2020-11-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3460-1 vom 2020-11-20", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-178 vom 2020-12-06", "url": "https://downloads.avaya.com/css/P8/documents/101072778" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-149 vom 2020-12-07", "url": "https://downloads.avaya.com/css/P8/documents/101072806" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2020-148 vom 2020-12-08", "url": "https://downloads.avaya.com/css/P8/documents/101072824" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5586 vom 2020-12-16", "url": "https://access.redhat.com/errata/RHSA-2020:5586" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:5585 vom 2020-12-16", "url": "https://access.redhat.com/errata/RHSA-2020:5585" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3932-1 vom 2020-12-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202101-19 vom 2021-01-25", "url": "https://security.gentoo.org/glsa/202101-19" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2021-103 vom 2021-02-05", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2021-103/index.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0530 vom 2021-02-16", "url": "https://access.redhat.com/errata/RHSA-2021:0530" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0512-1 vom 2021-02-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14634-1 vom 2021-02-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0533-1 vom 2021-02-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:14640-1 vom 2021-02-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0652-1 vom 2021-02-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0670-1 vom 2021-03-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:0665-1 vom 2021-03-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0717 vom 2021-03-03", "url": "https://access.redhat.com/errata/RHSA-2021:0717" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0736 vom 2021-03-04", "url": "https://access.redhat.com/errata/RHSA-2021:0736" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:0733 vom 2021-03-04", "url": "https://access.redhat.com/errata/RHSA-2021:0733" }, { "category": "external", "summary": "HCL Article KB0092294 vom 2021-08-12", "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0092294" }, { "category": "external", "summary": "F5 Security Advisory K35253541 vom 2022-12-06", "url": "https://support.f5.com/csp/article/K35253541" }, { "category": "external", "summary": "F5 Security Advisory K000135507 vom 2023-07-17", "url": "https://my.f5.com/manage/s/article/K000135507" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202409-26 vom 2024-09-28", "url": "https://security.gentoo.org/glsa/202409-26" }, { "category": "external", "summary": "Change Log for Amazon Corretto 11 vom 2025-01-21", "url": "https://github.com/corretto/corretto-11/blob/ece67a968d57210c69d3b9153576613846c1cacf/CHANGELOG.md" }, { "category": "external", "summary": "Change Log for Amazon Corretto 8 vom 2025-01-21", "url": "https://github.com/corretto/corretto-8/blob/14eb6b297ac476ca5734706b40903e5a69ecd74a/CHANGELOG.md" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:0066-1 vom 2025-02-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASJAVA-OPENJDK11-2025-013 vom 2025-04-29", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2025-013.html" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-04-29T22:00:00.000+00:00", "generator": { "date": "2025-04-30T08:54:58.902+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2022-2242", "initial_release_date": "2020-10-20T22:00:00.000+00:00", "revision_history": [ { "date": "2020-10-20T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-10-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2020-10-22T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-10-25T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Fedora und Debian aufgenommen" }, { "date": "2020-10-26T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-10-29T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2020-11-05T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-09T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2020-11-12T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-17T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-22T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-07T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-12-08T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-12-09T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-12-16T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-12-23T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-01-25T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-02-07T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2021-02-10T23:00:00.000+00:00", "number": "19", "summary": "Korrektur" }, { "date": "2021-02-15T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-02-18T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-21T23:00:00.000+00:00", "number": "22", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-23T23:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-02-28T23:00:00.000+00:00", "number": "24", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-01T23:00:00.000+00:00", "number": "25", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-03-03T23:00:00.000+00:00", "number": "26", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-03-04T23:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-11T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von HCL aufgenommen" }, { "date": "2022-12-06T23:00:00.000+00:00", "number": "29", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2023-07-16T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-09-29T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2025-01-21T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-04-29T22:00:00.000+00:00", "number": "34", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "34" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.9.11.1", "product": { "name": "Amazon Corretto \u003c11.0.9.11.1", "product_id": "T017545" } }, { "category": "product_version", "name": "11.0.9.11.1", "product": { "name": "Amazon Corretto 11.0.9.11.1", "product_id": "T017545-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:11.0.9.11.1" } } }, { "category": "product_version_range", "name": "\u003c11.0.26.4.1", "product": { "name": "Amazon Corretto \u003c11.0.26.4.1", "product_id": "T040500" } }, { "category": "product_version", "name": "11.0.26.4.1", "product": { "name": "Amazon Corretto 11.0.26.4.1", "product_id": "T040500-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:11.0.26.4.1" } } }, { "category": "product_version_range", "name": "\u003c8.442.06.1", "product": { "name": "Amazon Corretto \u003c8.442.06.1", "product_id": "T040501" } }, { "category": "product_version", "name": "8.442.06.1", "product": { "name": "Amazon Corretto 8.442.06.1", "product_id": "T040501-fixed", "product_identification_helper": { "cpe": "cpe:/a:amazon:corretto:8.442.06.1" } } } ], "category": "product_name", "name": "Corretto" }, { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Utility Services", "product": { "name": "Avaya Aura Utility Services", "product_id": "T015824", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_utility_services:-" } } }, { "category": "product_name", "name": "Avaya Breeze Platform", "product": { "name": "Avaya Breeze Platform", "product_id": "T015823", "product_identification_helper": { "cpe": "cpe:/a:avaya:breeze_platform:-" } } }, { "category": "product_name", "name": "Avaya Session Border Controller", "product": { "name": "Avaya Session Border Controller", "product_id": "T015520", "product_identification_helper": { "cpe": "cpe:/h:avaya:session_border_controller:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "HCL AppScan Enterprise", "product": { "name": "HCL AppScan Enterprise", "product_id": "T020129", "product_identification_helper": { "cpe": "cpe:/a:hcltech:appscan_enterprise:-" } } } ], "category": "vendor", "name": "HCL" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } }, { "category": "product_name", "name": "Hitachi Storage", "product": { "name": "Hitachi Storage", "product_id": "T009295", "product_identification_helper": { "cpe": "cpe:/h:hitachi:storage:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "580789", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Java SE", "product": { "name": "Oracle Java SE", "product_id": "T009724", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "product_status": { "known_affected": [ "67646", "T015824", "T015823", "T009724", "T010951", "T015127", "T015126", "T015520", "T020129", "T001663", "398363", "T015519", "T015518", "T015516", "T012167", "T017562", "2951", "T002207", "T017545", "580789", "T027843", "T040501", "T009295", "T040500", "1727" ] }, "release_date": "2020-10-20T22:00:00.000+00:00", "title": "CVE-2020-14803" } ] }
opensuse-su-2020:1893-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openj9", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openj9 fixes the following issues:\n\n-OpenJDK was updated to 8u2732 build 10 with OpenJ9 0.23.0 virtual machine\n -includes Oracle July 2020 (bsc#1174157) and October 2020 CPU (bsc#1177943)\n - CVE-2020-14556, CVE-2020-14577, CVE-2020-14578, CVE-2020-14579, CVE-2020-14581,\n CVE-2020-14583, CVE-2020-14593, CVE-2020-14621, CVE-2020-14779, CVE-2020-14781, \n CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798 \n and CVE-2020-14803\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1893", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1893-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1893-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1893-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HBBXJG37CKNUXLISK3DWSBAHF6A3VI34/" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-openj9", "tracking": { "current_release_date": "2020-11-10T08:37:50Z", "generator": { "date": "2020-11-10T08:37:50Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1893-1", "initial_release_date": "2020-11-10T08:37:50Z", "revision_history": [ { "date": "2020-11-10T08:37:50Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "product": { "name": "java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "product_id": "java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64", "product": { "name": "java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64", "product_id": "java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch" }, "product_reference": "java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" }, "product_reference": "java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openj9-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-accessibility-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-demo-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-devel-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-headless-1.8.0.272-lp152.3.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openj9-javadoc-1.8.0.272-lp152.3.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openj9-src-1.8.0.272-lp152.3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-10T08:37:50Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
opensuse-su-2020:1984-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,\n bsc#1177943)\n * New features\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector\n * Security fixes\n + JDK-8233624: Enhance JNI linkage\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8240124: Better VM Interning\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Other changes\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite loop\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed\n + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with Address\n already in use\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8172404: Tools should warn if weak algorithms are used\n before restricting them\n + JDK-8193367: Annotated type variable bounds crash javac\n + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java\n fails intermittently: Connection reset\n + JDK-8203026: java.rmi.NoSuchObjectException: no such object\n in table\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n + JDK-8204963: javax.swing.border.TitledBorder has a memory leak\n + JDK-8204994: SA might fail to attach to process with \u0027Windbg\n Error: WaitForEvent failed\u0027\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n + JDK-8206309: Tier1 SA tests fail\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java\n version - step1\n + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh\n is incorrect\n + JDK-8209342: Problemlist SA tests on Solaris due to Error\n attaching to process: Can\u0027t create thread_db agent!\n + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java\n should be marked as headful\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with\n timeout\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java\n version - step2\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with\n ZGC\n + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java\n + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error code\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java\n version - step3\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related\n tests\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails\n with waitForPrompt timed out after 60 seconds\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should\n clarify which output is the pending reply after a timeout\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java\n version - step4\n + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java\n fails to find ThreadLocalObject\n + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh\n test\n + JDK-8211694: JShell: Redeclared variable should be reset\n + JDK-8212200: assert when shared java.lang.Object is redefined\n by JVMTI agent\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)\n - unexpected. lastLine=52, minLine=52, maxLine=55\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by JVMTI\n agent)\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n + JDK-8213574: Deadlock in string table expansion when dumping\n lots of CDS classes\n + JDK-8213703: LambdaConversionException: Invalid receiver type\n not a subtype of implementation type interface\n + JDK-8214074: Ghash optimization using AVX instructions\n + JDK-8214491: Upgrade to JLine 3.9.0\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n + JDK-8215243: JShell tests failing intermitently with\n \u0027Problem cleaning up the following threads:\u0027\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash\n optimization using AVX instructions)\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n + JDK-8216021: RunTest.gmk might set concurrency level to 1 on\n Windows\n + JDK-8216974: HttpConnection not returned to the pool after\n 204 response\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are not\n reflected correctly during run time\n + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is\n too small on new Skylake CPUs\n + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs\n instead of aliased B\u0026W glyphs\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n + JDK-8221759: Crash when completing \u0027java.io.File.path\u0027\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not found\n + JDK-8222074: Enhance auto vectorization for x86\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely\n on hostname command\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n + JDK-8223940: Private key not supported by chosen signature\n algorithm\n + JDK-8224184: jshell got IOException at exiting with AIX\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails in\n test_mulc\n + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws\n NullPointerException\n + JDK-8225625: AES Electronic Codebook (ECB) encryption and\n decryption optimization using AVX512 + VAES instructions\n + JDK-8226536: Catch OOM from deopt that fails rematerializing\n objects\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java\n fails due to \u0027exitValue = 6\u0027\n + JDK-8228448: Jconsole can\u0027t connect to itself\n + JDK-8228967: Trust/Key store and SSL context utilities for\n tests\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8229815: Upgrade Jline to 3.12.1\n + JDK-8230000: some httpclients testng tests run zero test\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n + JDK-8230402: Allocation of compile task fails with assert:\n \u0027Leaking compilation tasks?\u0027\n + JDK-8230767: FlightRecorderListener returns null recording\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to\n test/jdk/java/util/zip/EntryCount64k.java\n + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()\n can be quicker for self thread\n + JDK-8231586: enlarge encoding space for OopMapValue offsets\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n + JDK-8232161: Align some one-way conversion in MS950 charset\n with Windows\n + JDK-8232855: jshell missing word in /help help\n + JDK-8233027: OopMapSet::all_do does oms.next() twice during\n iteration\n + JDK-8233228: Disable weak named curves by default in TLS,\n CertPath, and Signed JAR\n + JDK-8233386: Initialize NULL fields for unused decorations\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n + JDK-8233686: XML transformer uses excessive amount of memory\n + JDK-8233741: AES Countermode (AES-CTR) optimization using\n AVX512 + VAES instructions\n + JDK-8233829: javac cannot find non-ASCII module name under\n non-UTF8 environment\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with \u0027Narrow klass base:\n 0x0000000000000000\u0027 missing from stdout/stderr\n + JDK-8234149: Several regression tests do not dispose Frame at\n end\n + JDK-8234347: \u0027Turkey\u0027 meta time zone does not generate\n composed localized names\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n + JDK-8234535: Cross compilation fails due to missing CFLAGS\n for the BUILD_CC\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n + JDK-8234687: change javap reporting on unknown attributes\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK\n 11\n + JDK-8236548: Localized time zone name inconsistency between\n English and other locales\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails when\n checking validity interval\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n + JDK-8238270: java.net HTTP/2 client does not decrease stream\n count when receives 204 response\n + JDK-8238284: [macos] Zero VM build fails due to an obvious\n typo\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388: libj2gss/NativeFunc.o \u0027multiple definition\u0027 link\n errors with GCC10\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n + JDK-8238710: LingeredApp doesn\u0027t log stdout/stderr if exits\n with non-zero code\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder-\u003eis_instance_klass() \u0026\u0026\n (!known_holder-\u003eis_interface() ||\n ((ciInstanceKlass*)known_holder)-\u003ehas_nonstatic_concrete_methods())),\n \u0027should be non-static concrete method\u0027);\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8240169: javadoc fails to link to non-modular api docs\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8240360: NativeLibraryEvent has wrong library name on\n Linux\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n + JDK-8241319: WB_GetCodeBlob doesn\u0027t have ResourceMark\n + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java\n fails with OOME\n + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8242184: CRL generation error with RSASSA-PSS\n + JDK-8242283: Can\u0027t start JVM when java home path includes\n non-ASCII character\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test framework\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n + JDK-8243453: java --describe-module failed with non-ASCII\n module name under non-UTF8 environment\n + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on\n HiDPI screens (Windows)\n + JDK-8244087: 2020-04-24 public suffix list update\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n + JDK-8244196: adjust output in os_linux\n + JDK-8244225: stringop-overflow warning on strncpy call from\n compile_the_world_in\n + JDK-8244287: JFR: Methods samples have line number 0\n + JDK-8244703: \u0027platform encoding not initialized\u0027 exceptions\n with debugger, JNI\n + JDK-8244719: CTW: C2 compilation fails with\n \u0027assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it\u0027\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n + JDK-8244763: Update --release 8 symbol information after JSR\n 337 MR3\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8245151: jarsigner should not raise duplicate warnings on\n verification\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n + JDK-8245714: \u0027Bad graph detected in build_loop_late\u0027 when\n loads are pinned on loop limit check uncommon branch\n + JDK-8245801: StressRecompilation triggers assert \u0027redundunt\n OSR recompilation detected. memory leak in CodeCache!\u0027\n + JDK-8245832: JDK build make-static-libs should build all JDK\n libraries\n + JDK-8245880: Shenandoah: check class unloading flag early in\n concurrent code root scan\n + JDK-8245981: Upgrade to jQuery 3.5.1\n + JDK-8246027: Minimal fastdebug build broken after JDK-8245801\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n + JDK-8246153: TestEliminateArrayCopy fails with\n -XX:+StressReflectiveCode\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest\n fails with AssertionError\n + JDK-8246203: Segmentation fault in verification due to stack\n overflow with -XX:+VerifyIterativeGVN\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n + JDK-8246453: TestClone crashes with \u0027all collected exceptions\n must come from the same place\u0027\n + JDK-8247246: Add explicit ResolvedJavaType.link and expose\n presence of default methods\n + JDK-8247350: [aarch64] assert(false) failed: wrong size of\n mach node\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n + JDK-8247615: Initialize the bytes left for the heap sampler\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV\n in SBC2Support::pin_and_expand\n + JDK-8247874: Replacement in VersionProps.java.template not\n working when --with-vendor-bug-url contains \u0027\u0026\u0027\n + JDK-8247979: aarch64: missing side effect of killing flags\n for clearArray_reg_reg\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n + JDK-8248495: [macos] zerovm is broken due to libffi headers\n location\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8248987: AOT\u0027s Linker.java seems to eagerly fail-fast on\n Windows\n + JDK-8249159: Downport test rework for SSLSocketTemplate from\n 8224650\n + JDK-8249215: JFrame::setVisible crashed with\n -Dfile.encoding=UTF-8 on Japanese Windows.\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is\n not highlighted in GTKLookAndFeel\n + JDK-8249255: Build fails if source code in cygwin home dir\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should\n account for corner cases\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when\n requesting TGS Kerberos tickets\n + JDK-8250609: C2 crash in IfNode::fold_compares\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java\n + JDK-8250787: Provider.put no longer registering aliases in\n FIPS env\n + JDK-8250826: jhsdb does not work with coredump which comes\n from Substrate VM\n + JDK-8250827: Shenandoah: needs to reset/finish StringTable\u0027s\n dead count before/after parallel walk\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check\n the bounds\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java\n test failure\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with\n I-U\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n + JDK-8251487: Shenandoah: missing detail timing tracking for\n final mark cleaning phase\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells \u0027occured\u0027\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n + JDK-8252258: [11u] JDK-8242154 changes the default vendor\n + JDK-8252804: [test] Fix \u0027ReleaseDeflater.java\u0027 test after\n downport of 8234011\n + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)\n in JDK 11\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes several\n crashes\n + Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*,\n bool)\u0027 introduced in jdk 11.0.9\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1984", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1984-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1984-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1984-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-11-20T23:23:29Z", "generator": { "date": "2020-11-20T23:23:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1984-1", "initial_release_date": "2020-11-20T23:23:29Z", "revision_history": [ { "date": "2020-11-20T23:23:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "product": { "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "product_id": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64", "product_id": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586" }, "product_reference": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-accessibility-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-demo-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-devel-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-headless-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-javadoc-11.0.9.0-lp151.3.22.1.noarch", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-jmods-11.0.9.0-lp151.3.22.1.x86_64", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.i586", "openSUSE Leap 15.1:java-11-openjdk-src-11.0.9.0-lp151.3.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-20T23:23:29Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
opensuse-su-2024:10873-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-15-openjdk-15.0.4.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10873", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10873-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-15-openjdk-15.0.4.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10873-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2020:2083-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*, bool)\u0027,\n introduced in October 2020 CPU.\n\n- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\n bsc#1174157, and October 2020 CPU, bsc#1177943)\n * New features\n + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7\n + PR3796: Allow the number of curves supported to be specified\n * Security fixes\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in\n sun.security.util.DerInputStream.getUnalignedBitString()\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233255: Better Swing Buttons\n + JDK-8233624: Enhance JNI linkage\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240124: Better VM Interning\n + JDK-8240482: Improved WAV file playback\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Import of OpenJDK 8 u262 build 01\n + JDK-4949105: Access Bridge lacks html tags parsing\n + JDK-8003209: JFR events for network utilization\n + JDK-8030680: 292 cleanup from default method code assessment\n + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java\n and some tests failed on windows intermittently\n + JDK-8041626: Shutdown tracing event\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n + JDK-8149338: JVM Crash caused by Marlin renderer not handling\n NaN coordinates\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to \u0027Connection\n succeeded\u0027\n + JDK-8165675: Trace event for thread park has incorrect unit\n for timeout\n + JDK-8176182: 4 security tests are not run\n + JDK-8178910: Problemlist sample tests\n + JDK-8183925: Decouple crash protection from watcher thread\n + JDK-8191393: Random crashes during cfree+0x1c\n + JDK-8195817: JFR.stop should require name of recording\n + JDK-8195818: JFR.start should increase autogenerated name by\n one\n + JDK-8195819: Remove recording=x from jcmd JFR.check output\n + JDK-8199712: Flight Recorder\n + JDK-8202578: Revisit location for class unload events\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on\n missing events\n + JDK-8203287: Zero fails to build after JDK-8199712 (Flight\n Recorder)\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n + JDK-8203664: JFR start failure after AppCDS archive created\n with JFR StartFlightRecording\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n + JDK-8203929: Limit amount of data for JFR.dump\n + JDK-8205516: JFR tool\n + JDK-8207392: [PPC64] Implement JFR profiling\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first\n classloader which calls it\n + JDK-8209960: -Xlog:jfr* doesn\u0027t work with the JFR\n + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD\n 1.0.7\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n + JDK-8213015: Inconsistent settings between JFR.configure and\n -XX:FlightRecorderOptions\n + JDK-8213421: Line number information for execution samples\n always 0\n + JDK-8213617: JFR should record the PID of the recorded process\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n + JDK-8213914: [TESTBUG] Several JFR VM events are not covered\n by tests\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by\n test\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n + JDK-8214542: JFR: Old Object Sample event slow on a deep heap\n in debug builds\n + JDK-8214750: Unnecessary \u003cp\u003e tags in jfr classes\n + JDK-8214896: JFR Tool left files behind\n + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java\n fails with UnsatisfiedLinkError\n + JDK-8214925: JFR tool fails to execute\n + JDK-8215175: Inconsistencies in JFR event metadata\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n + JDK-8215355: Object monitor deadlock with no threads holding\n the monitor (using jemalloc 5.1)\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n + JDK-8215771: The jfr tool should pretty print reference chains\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn\u0027t work\n properly\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n + JDK-8216559: [JFR] Native libraries not correctly parsed from\n /proc/self/maps\n + JDK-8216578: Remove unused/obsolete method in JFR code\n + JDK-8216995: Clean up JFR command line processing\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some\n systems due to process surviving SIGINT\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR\n TestShutdownEvent\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n + JDK-8223147: JFR Backport\n + JDK-8223689: Add JFR Thread Sampling Support\n + JDK-8223690: Add JFR BiasedLock Event Support\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n + JDK-8224475: JTextPane does not show images in HTML rendering\n + JDK-8226253: JAWS reports wrong number of radio buttons when\n buttons are hidden.\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n + JDK-8226892: ActionListeners on JRadioButtons don\u0027t get\n notified when selection is changed with arrow keys\n + JDK-8227011: Starting a JFR recording in response to JVMTI\n VMInit and / or Java agent premain corrupts memory\n + JDK-8227605: Kitchensink fails \u0027assert((((klass)-\u003etrace_id()\n \u0026 (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant\u0027\n + JDK-8229366: JFR backport allows unchecked writing to memory\n + JDK-8229401: Fix JFR code cache test failures\n + JDK-8229708: JFR backport code does not initialize\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on\n Windows\n + JDK-8230707: JFR related tests are failing\n + JDK-8230782: Robot.createScreenCapture() fails if\n \u0027awt.robot.gtk\u0027 is set to false\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on\n unix misses ReleaseStringUTFChars in early return\n + JDK-8230947: TestLookForUntestedEvents.java is failing after\n JDK-8230707\n + JDK-8231995: two jtreg tests failed after 8229366 is fixed\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n + JDK-8236002: CSR for JFR backport suggests not leaving out\n the package-info\n + JDK-8236008: Some backup files were accidentally left in the\n hotspot tree\n + JDK-8236074: Missed package-info\n + JDK-8236174: Should update javadoc since tags\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when\n there are external FIPS modules in the NSSDB\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n + JDK-8238590: Enable JFR by default during compilation in 8u\n + JDK-8239055: Wrong implementation of VMState.hasListener\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n + JDK-8239479: minimal1 and zero builds are failing\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n + JDK-8240375: Disable JFR by default for July 2020 release\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n * Import of OpenJDK 8 u262 build 02\n + JDK-8130737: AffineTransformOp can\u0027t handle child raster with\n non-zero x-offset\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation\n in java/awt/image/Raster/TestChildRasterOp.java\n + JDK-8230926: [macosx] Two apostrophes are entered instead of\n one with \u0027U.S. International - PC\u0027 layout\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n + JDK-8242883: Incomplete backport of JDK-8078268: backport\n test part\n * Import of OpenJDK 8 u262 build 03\n + JDK-8037866: Replace the Fun class in tests with lambdas\n + JDK-8146612: C2: Precedence edges specification violated\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects HPROF\n JAVA PROFILE 1.0.1 file format\n + JDK-8229888: (zipfs) Updating an existing zip file does not\n preserve original permissions\n + JDK-8230597: Update GIFlib library to the 5.2.1\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n + JDK-8233880, PR3798: Support compilers with multi-digit major\n version numbers\n + JDK-8239852: java/util/concurrent tests fail with\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:\n verification should have failed\n + JDK-8241638: launcher time metrics always report 1 on Linux\n when _JAVA_LAUNCHER_DEBUG set\n + JDK-8243059: Build fails when --with-vendor-name contains a\n comma\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n * Import of OpenJDK 8 u262 build 04\n + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn\u0027t\n throw NPE if timeout is less than, or equal to zero when unit\n == null\n + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()\n does not recognize OpenJDK\u0027s HotSpot VM\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n + JDK-8243539: Copyright info (Year) should be updated for fix\n of 8241638\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash value\n * Import of OpenJDK 8 u262 build 05\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn\u0027t run in agentvm mode\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n + JDK-8181841: A TSA server returns timestamp with precision\n higher than milliseconds\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n + JDK-8236996: Incorrect Roboto font rendering on Windows with\n subpixel antialiasing\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n + JDK-8244843: JapanEraNameCompatTest fails\n * Import of OpenJDK 8 u262 build 06\n + JDK-8246223: Windows build fails after JDK-8227269\n * Import of OpenJDK 8 u262 build 07\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and\n Jfr:on_vm_start() start-up order for correct option parsing\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n + JDK-8245167: Top package in method profiling shows null in JMC\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n * Import of OpenJDK 8 u262 build 08\n + JDK-8220293: Deadlock in JFR string pool\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n + JDK-8225069: Remove Comodo root certificate that is expiring\n in May 2020\n * Import of OpenJDK 8 u262 build 09\n + JDK-8248399: Build installs jfr binary when JFR is disabled\n * Import of OpenJDK 8 u262 build 10\n + JDK-8248715: New JavaTimeSupplementary localisation for \u0027in\u0027\n installed in wrong package\n * Import of OpenJDK 8 u265 build 01\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n + JDK-8250546: Expect changed behaviour reported in JDK-8249846\n * Import of OpenJDK 8 u272 build 01\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n + JDK-8075774: Small readability and performance improvements\n for zipfs\n + JDK-8132206: move ScanTest.java into OpenJDK\n + JDK-8132376: Add @requires os.family to the client tests with\n access to internal OS-specific API\n + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n + JDK-8165936: Potential Heap buffer overflow when seaching\n timezone info files\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n + JDK-8167300: Scheduling failures during gcm should be fatal\n + JDK-8167615: Opensource unit/regression tests for JavaSound\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n + JDK-8177628: Opensource unit/regression tests for ImageIO\n + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java\n + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n + JDK-8193137: Nashorn crashes when given an empty script file\n + JDK-8194298: Add support for per Socket configuration of TCP\n keepalive\n + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java\n throws error\n + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java\n fails\n + JDK-8210147: adjust some WSAGetLastError usages in windows\n network coding\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n + JDK-8217647: JFR: recordings on 32-bit systems unreadable\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8230303: JDB hangs when running monitor command\n + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)\n return NULL if n is not in the CG\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n + JDK-8235325: build failure on Linux after 8235243\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink\n + JDK-8237951: CTW: C2 compilation fails with \u0027malformed\n control flow\u0027\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8239819: XToolkit: Misread of screen information memory\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n + JDK-8242498: Invalid \u0027sun.awt.TimedWindowEvent\u0027 object leads\n to JVM crash\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n + JDK-8246384: Enable JFR by default on supported architectures\n for October 2020 release\n + JDK-8248643: Remove extra leading space in JDK-8240295 8u\n backport\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String... keys)\n method public\n * Import of OpenJDK 8 u272 build 02\n + JDK-8023697: failed class resolution reports different class\n name in detail message for the first and subsequent times\n + JDK-8025886: replace [[ and == bash extensions in regtest\n + JDK-8046274: Removing dependency on jakarta-regexp\n + JDK-8048933: -XX:+TraceExceptions output should include the\n message\n + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/\n /fileaccess/FontFile.java fails\n + JDK-8148854: Class names \u0027SomeClass\u0027 and \u0027LSomeClass;\u0027\n treated by JVM as an equivalent\n + JDK-8154313: Generated javadoc scattered all over the place\n + JDK-8163251: Hard coded loop limit prevents reading of smart\n card data greater than 8k\n + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java\n fails with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n + JDK-8201633: Problems with AES-GCM native acceleration\n + JDK-8211049: Second parameter of \u0027initialize\u0027 method is not\n used\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n + JDK-8220555: JFR tool shows potentially misleading message\n when it cannot access a file\n + JDK-8224217: RecordingInfo should use textual representation\n of path\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/\n /SctpNet.c \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o \u0027multiple\n definition\u0027 link errors with GCC10\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n * Import of OpenJDK 8 u272 build 03\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n + JDK-8148754: C2 loop unrolling fails due to unexpected graph\n shape\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests\n fail with error : revokeall.exe: Permission denied\n + JDK-8203357: Container Metrics\n + JDK-8209113: Use WeakReference for lastFontStrike for created\n Fonts\n + JDK-8216283: Allow shorter method sampling interval than 10 ms\n + JDK-8221569: JFR tool produces incorrect output when both\n --categories and --events are specified\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8250875: Incorrect parameter type for update_number in\n JDK_Version::jdk_update\n * Import of OpenJDK 8 u272 build 04\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws\n IllegalArgumentException for flags of type double\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n + JDK-8217878: ENVELOPING XML signature no longer works in JDK\n 11\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n * Import of OpenJDK 8 u272 build 05\n + JDK-8026236: Add PrimeTest for BigInteger\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n + JDK-8152077: (cal) Calendar.roll does not always roll the\n hours during daylight savings\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n + JDK-8211163: UNIX version of Java_java_io_Console_echo does\n not return a clean boolean\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in\n docker container only works with debug JVMs\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n * Import of OpenJDK 8 u272 build 06\n + JDK-8064319: Need to enable -XX:+TraceExceptions in release\n builds\n + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11\n v2.40 support\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()\n not working\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface\n license\n + JDK-8184762: ZapStackSegments should use optimized memset\n + JDK-8193234: When using -Xcheck:jni an internally allocated\n buffer can leak\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n + JDK-8220313: [TESTBUG] Update base image for Docker testing\n to OL 7.6\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8225695: 32-bit build failures after JDK-8080462 (Update\n SunPKCS11 provider with PKCS11 v2.40 support)\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension property\n name\n + JDK-8238898, PR3801: Missing hash characters for header on\n license file\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n + JDK-8245469: Remove DTLS protocol implementation\n + JDK-8245470: Fix JDK8 compatibility issues\n + JDK-8245471: Revert JDK-8148188\n + JDK-8245472: Backport JDK-8038893 to JDK8\n + JDK-8245473: OCSP stapling support\n + JDK-8245474: Add TLS_KRB5 cipher suites support according to\n RFC-2712\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n + JDK-8245477: Adjust TLS tests location\n + JDK-8245653: Remove 8u TLS tests\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is\n set to either true or false\n + JDK-8251341: Minimal Java specification change\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n * Import of OpenJDK 8 u272 build 07\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n * Import of OpenJDK 8 u272 build 08\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8252573: 8u: Windows build failed after 8222079 backport\n * Import of OpenJDK 8 u272 build 09\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n * Import of OpenJDK 8 u272 build 10\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed\n by the fix for JDK-8249158\n + JDK-8254937: Revert JDK-8148854 for 8u272\n * Backports\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several\n client tests unaffected by the automated bulk update\n + JDK-8144015, PR3806: [PIT] failures of text layout font tests\n + JDK-8144023, PR3806: [PIT] failure of text measurements in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.java\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8145542, PR3806: The case failed automatically and thrown\n java.lang.ArrayIndexOutOfBoundsException exception\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when\n displaying Devanagari text in JEditorPane\n + JDK-8152358, PR3800: code and comment cleanups found during\n the hunt for 8077392\n + JDK-8152545, PR3804: Use preprocessor instead of compiling a\n program to generate native nio constants\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation failed\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n + JDK-8191522, PR3806: Remove Bigelow\u0026Holmes Lucida fonts from\n JDK sources\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n * Bug fixes\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a \u0027%s\u0027 directive\n + PR3795: ECDSAUtils for XML digital signatures should support\n the same curve set as the rest of the JDK\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n + PR3808: IcedTea does not install the JFR *.jfc files\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has\n fixed its use with Shenandoah\n + PR3811: Don\u0027t attempt to install JFR files when JFR is\n disabled\n * Shenandoah\n + [backport] 8221435: Shenandoah should not mark through weak\n roots\n + [backport] 8221629: Shenandoah: Cleanup class unloading logic\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n + [backport] 8223215: Shenandoah: Support verifying subset of\n roots\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache roots\n + [backport] 8224508: Shenandoah: Need to update thread roots\n in final mark for piggyback ref update cycle\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n --disable-precompiled-headers\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n + [backport] 8224751: Shenandoah: Shenandoah Verifier should\n select proper roots according to current GC cycle\n + [backport] 8225014: Separate ShenandoahRootScanner method for\n object_iterate\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn\u0027t\n work for Shenandoah\n + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to\n ensure roots to-space invariant\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n + [backport] 8226413: Shenandoah: Separate root scanner for\n SH::object_iterate()\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n + [backport] 8231198: Shenandoah: heap walking should visit all\n roots most of the time\n + [backport] 8231244: Shenandoah: all-roots heap walking misses\n some weak roots\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n + [backport] 8239786: Shenandoah: print per-cycle statistics\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod\u0027s metadata\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n + [backport] 8240750: Shenandoah: remove leftover files and\n mentions of ShenandoahAllocTracker\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n + [backport] 8240872: Shenandoah: Avoid updating new regions\n from start of evacuation\n + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers\n + [backport] 8240915: Shenandoah: Remove unused fields in init\n mark tasks\n + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects\n paths after JDK-8240868\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + [backport] 8241062: Shenandoah: rich asserts trigger \u0027empty\n statement\u0027 inspection\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n + [backport] 8241093: Shenandoah: editorial changes in flag\n descriptions\n + [backport] 8241139: Shenandoah: distribute mark-compact work\n exactly to minimize fragmentation\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n + [backport] 8241351: Shenandoah: fragmentation metrics overhaul\n + [backport] 8241435: Shenandoah: avoid disabling pacing with\n \u0027aggressive\u0027\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n + [backport] 8241534: Shenandoah: region status should include\n update watermark\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n + [backport] 8241583: Shenandoah: turn heap lock asserts into\n macros\n + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not\n derive from ContiguousSpace\n + [backport] 8241673: Shenandoah: refactor anti-false-sharing\n padding\n + [backport] 8241675: Shenandoah: assert(n-\u003eoutcnt() \u003e 0) at\n shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n + [backport] 8241748: Shenandoah: inline MarkingContext TAMS\n methods\n + [backport] 8241838: Shenandoah: no need to trash cset during\n final mark\n + [backport] 8241841: Shenandoah: ditch one of allocation type\n counters in ShenandoahHeapRegion\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions\n to cache lines\n + [backport] 8241926: Shenandoah: only print heap changes for\n operations that directly affect it\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n + [backport] 8241985: Shenandoah: simplify collectable garbage\n logging\n + [backport] 8242040: Shenandoah: print allocation failure type\n + [backport] 8242041: Shenandoah: adaptive heuristics should\n account evac reserve in free target\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n + [backport] 8242054: Shenandoah: New incremental-update mode\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n + [backport] 8242083: Shenandoah: split \u0027Prepare Evacuation\u0027\n tracking into cset/freeset counters\n + [backport] 8242089: Shenandoah: per-worker stats should be\n summed up, not averaged\n + [backport] 8242101: Shenandoah: coalesce and parallelise heap\n region walks during the pauses\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier\n dispatching\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n + [backport] 8242227: Shenandoah: transit regions to cset state\n when adding to collection set\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion\n liveness-related methods\n + [backport] 8242267: Shenandoah: regions space needs to be\n aligned by os::vm_allocation_granularity()\n + [backport] 8242271: Shenandoah: add test to verify GC mode\n unlock\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n + [backport] 8242316: Shenandoah: Turn NULL-check into assert\n in SATB slow-path entry\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n + [backport] 8242641: Shenandoah: clear live data and update\n TAMS optimistically\n + [backport] 8243238: Shenandoah: explicit GC request should\n wait for a complete GC cycle\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n + [backport] 8243463: Shenandoah: ditch total_pause counters\n + [backport] 8243464: Shenandoah: print statistic counters in\n time order\n + [backport] 8243465: Shenandoah: ditch unused pause_other,\n conc_other counters\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n + [backport] 8243494: Shenandoah: set counters once per cycle\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n + [backport] 8243848: Shenandoah: Windows build fails after\n JDK-8239786\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n + [backport] 8244226: Shenandoah: per-cycle statistics contain\n worker data from previous cycles\n + [backport] 8244326: Shenandoah: global statistics should not\n accept bogus samples\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state\n takes loop for wrong control\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the heuristics\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n + [backport] 8244739: Shenandoah: break superclass dependency\n on ShenandoahNormalMode\n + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode\n to ShenandoahSATBMode\n + [backport] 8245461: Shenandoah: refine mode name()-s\n + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings\n constructor arguments\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n + [backport] 8245465: Shenandoah: test_in_cset can use more\n efficient encoding\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should not\n disable heap resizing or uncommits\n + [backport] 8245773: Shenandoah: Windows assertion failure\n after JDK-8245464\n + [backport] 8245812: Shenandoah: compute root phase parallelism\n + [backport] 8245814: Shenandoah: reconsider format specifiers\n for stats\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n + [backport] 8246162: Shenandoah: full GC does not mark code\n roots when class unloading is off\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n + [backport] 8247358: Shenandoah: reconsider free budget slice\n for marking\n + [backport] 8247367: Shenandoah: pacer should wait on lock\n instead of exponential backoff\n + [backport] 8247474: Shenandoah: Windows build warning after\n JDK-8247310\n + [backport] 8247560: Shenandoah: heap iteration holds root\n locks all the time\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n + [backport] 8247751: Shenandoah: options tests should run with\n smaller heaps\n + [backport] 8247754: Shenandoah: mxbeans tests can be shorter\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n + [backport] 8247860: Shenandoah: add update watermark line in\n rich assert failure message\n + [backport] 8248041: Shenandoah: pre-Full GC root updates may\n miss some roots\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n + [backport] 8249560: Shenandoah: Fix racy GC request handling\n + [backport] 8249649: Shenandoah: provide per-cycle pacing stats\n + [backport] 8249801: Shenandoah: Clear soft-refs on requested\n GC cycle\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n + Fix slowdebug build after JDK-8230853 backport\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n + Shenandoah: add root statistics for string dedup table/queues\n + Shenandoah: enable low-frequency STW class unloading\n + Shenandoah: fix build failures after JDK-8244737 backport\n + Shenandoah: Fix build failure with +JFR -PCH\n + Shenandoah: fix forceful pacer claim\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n + Shenandoah: fix runtime linking failure due to non-compiled\n shenandoahBarrierSetC1\n + Shenandoah: hook statistics printing to PrintGCDetails, not\n PrintGC\n + Shenandoah: JNI weak roots are always cleared before Full GC\n mark\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n + Shenandoah: move barrier sets to their proper locations\n + Shenandoah: move parallelCleaning.* to shenandoah/\n + Shenandoah: pacer should use proper Atomics for intptr_t\n + Shenandoah: properly deallocates class loader metadata\n + Shenandoah: specialize String Table scans for better pause\n performance\n + Shenandoah: Zero build fails after recent Atomic cleanup in\n Pacer\n * AArch64 port\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java\n generates guarantee failure in C1\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection from\n watcher thread\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n + JDK-8203481, PR3797: Incorrect constraint for unextended_sp\n in frame:safe_for_sender\n + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall\n fails with SIGILL on aarch64\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command\n + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java\n fails on AArch64\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()\n does not check for zero length on AARCH64\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n + JDK-8221658, PR3797: aarch64: add necessary predicate for\n ubfx patterns\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n + JDK-8247979, PR3797: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-2083", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2083-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:2083-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:2083-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2020-11-27T13:25:52Z", "generator": { "date": "2020-11-27T13:25:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:2083-1", "initial_release_date": "2020-11-27T13:25:52Z", "revision_history": [ { "date": "2020-11-27T13:25:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-accessibility-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-demo-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-devel-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-headless-1.8.0.272-lp152.2.3.1.x86_64", "openSUSE Leap 15.2:java-1_8_0-openjdk-javadoc-1.8.0.272-lp152.2.3.1.noarch", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.i586", "openSUSE Leap 15.2:java-1_8_0-openjdk-src-1.8.0.272-lp152.2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T13:25:52Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
opensuse-su-2020:1994-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk fixes the following issues:\n\n- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,\n bsc#1177943)\n * New features\n + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector\n * Security fixes\n + JDK-8233624: Enhance JNI linkage\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8240124: Better VM Interning\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Other changes\n + JDK-6532025: GIF reader throws misleading exception with\n truncated images\n + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/\n /PDialogTest.java needs update by removing an infinite loop\n + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/\n /Test8017492.java fails\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed\n + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/\n /CloseServerSocket.java fails intermittently with Address\n already in use\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8172404: Tools should warn if weak algorithms are used\n before restricting them\n + JDK-8193367: Annotated type variable bounds crash javac\n + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java\n fails intermittently: Connection reset\n + JDK-8203026: java.rmi.NoSuchObjectException: no such object\n in table\n + JDK-8203281: [Windows] JComboBox change in ui when\n editor.setBorder() is called\n + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to\n resolve_wk_klass\n + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and\n JdbExprTest.sh fail due to timeout\n + JDK-8203928: [Test] Convert non-JDB scaffolding\n serviceability shell script tests to java\n + JDK-8204963: javax.swing.border.TitledBorder has a memory leak\n + JDK-8204994: SA might fail to attach to process with \u0027Windbg\n Error: WaitForEvent failed\u0027\n + JDK-8205534: Remove SymbolTable dependency from\n serviceability agent\n + JDK-8206309: Tier1 SA tests fail\n + JDK-8208281: java/nio/channels/\n /AsynchronousSocketChannel/Basic.java timed out\n + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java\n version - step1\n + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh\n is incorrect\n + JDK-8209342: Problemlist SA tests on Solaris due to Error\n attaching to process: Can\u0027t create thread_db agent!\n + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java\n should be marked as headful\n + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with\n timeout\n + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java\n version - step2\n + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with\n ZGC\n + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java\n + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/\n /ap10t001/TestDescription.java failed with ObjectFree:\n GetCurrentThreadCpuTimerInfo returned unexpected error code\n + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java\n version - step3\n + JDK-8210527: JShell: NullPointerException in\n jdk.jshell.Eval.translateExceptionStack\n + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related\n tests\n + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails\n with waitForPrompt timed out after 60 seconds\n + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should\n clarify which output is the pending reply after a timeout\n + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java\n version - step4\n + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java\n fails to find ThreadLocalObject\n + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh\n test\n + JDK-8211694: JShell: Redeclared variable should be reset\n + JDK-8212200: assert when shared java.lang.Object is redefined\n by JVMTI agent\n + JDK-8212629: [TEST] wrong breakpoint in\n test/jdk/com/sun/jdi/DeferredStepTest\n + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)\n - unexpected. lastLine=52, minLine=52, maxLine=55\n + JDK-8212807: tools/jar/multiRelease/Basic.java times out\n + JDK-8213182: Minimal VM build failure after JDK-8212200\n (assert when shared java.lang.Object is redefined by JVMTI\n agent)\n + JDK-8213214: Set -Djava.io.tmpdir= when running tests\n + JDK-8213275: ReplaceCriticalClasses.java fails with\n jdk.internal.vm.PostVMInitHook not found\n + JDK-8213574: Deadlock in string table expansion when dumping\n lots of CDS classes\n + JDK-8213703: LambdaConversionException: Invalid receiver type\n not a subtype of implementation type interface\n + JDK-8214074: Ghash optimization using AVX instructions\n + JDK-8214491: Upgrade to JLine 3.9.0\n + JDK-8214797: TestJmapCoreMetaspace.java timed out\n + JDK-8215243: JShell tests failing intermitently with\n \u0027Problem cleaning up the following threads:\u0027\n + JDK-8215244: jdk/jshell/ToolBasicTest.java\n testHistoryReference failed\n + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash\n optimization using AVX instructions)\n + JDK-8215438: jshell tool: Ctrl-D causes EOF\n + JDK-8216021: RunTest.gmk might set concurrency level to 1 on\n Windows\n + JDK-8216974: HttpConnection not returned to the pool after\n 204 response\n + JDK-8218948: SimpleDateFormat :: format - Zone Names are not\n reflected correctly during run time\n + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is\n too small on new Skylake CPUs\n + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs\n instead of aliased B\u0026W glyphs\n + JDK-8221658: aarch64: add necessary predicate for ubfx\n patterns\n + JDK-8221759: Crash when completing \u0027java.io.File.path\u0027\n + JDK-8221918: runtime/SharedArchiveFile/serviceability/\n /ReplaceCriticalClasses.java fails: Shared archive not found\n + JDK-8222074: Enhance auto vectorization for x86\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely\n on hostname command\n + JDK-8223688: JShell: crash on the instantiation of raw\n anonymous class\n + JDK-8223777: In posix_spawn mode, failing to exec()\n jspawnhelper does not result in an error\n + JDK-8223940: Private key not supported by chosen signature\n algorithm\n + JDK-8224184: jshell got IOException at exiting with AIX\n + JDK-8224234: compiler/codegen/TestCharVect2.java fails in\n test_mulc\n + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws\n NullPointerException\n + JDK-8225625: AES Electronic Codebook (ECB) encryption and\n decryption optimization using AVX512 + VAES instructions\n + JDK-8226536: Catch OOM from deopt that fails rematerializing\n objects\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8227059: sun/security/tools/keytool/\n /DefaultSignatureAlgorithm.java timed out\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java\n fails due to \u0027exitValue = 6\u0027\n + JDK-8228448: Jconsole can\u0027t connect to itself\n + JDK-8228967: Trust/Key store and SSL context utilities for\n tests\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8229815: Upgrade Jline to 3.12.1\n + JDK-8230000: some httpclients testng tests run zero test\n + JDK-8230002: javax/xml/jaxp/unittest/transform/\n /SecureProcessingTest.java runs zero test\n + JDK-8230010: Remove jdk8037819/BasicTest1.java\n + JDK-8230094: CCE in createXMLEventWriter(Result) over an\n arbitrary XMLStreamWriter\n + JDK-8230402: Allocation of compile task fails with assert:\n \u0027Leaking compilation tasks?\u0027\n + JDK-8230767: FlightRecorderListener returns null recording\n + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to\n test/jdk/java/util/zip/EntryCount64k.java\n + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()\n can be quicker for self thread\n + JDK-8231586: enlarge encoding space for OopMapValue offsets\n + JDK-8231953: Wrong assumption in assertion in\n oop::register_oop\n + JDK-8231968: getCurrentThreadAllocatedBytes default\n implementation s/b getThreadAllocatedBytes\n + JDK-8232083: Minimal VM is broken after JDK-8231586\n + JDK-8232161: Align some one-way conversion in MS950 charset\n with Windows\n + JDK-8232855: jshell missing word in /help help\n + JDK-8233027: OopMapSet::all_do does oms.next() twice during\n iteration\n + JDK-8233228: Disable weak named curves by default in TLS,\n CertPath, and Signed JAR\n + JDK-8233386: Initialize NULL fields for unused decorations\n + JDK-8233452: java.math.BigDecimal.sqrt() with\n RoundingMode.FLOOR results in incorrect result\n + JDK-8233686: XML transformer uses excessive amount of memory\n + JDK-8233741: AES Countermode (AES-CTR) optimization using\n AVX512 + VAES instructions\n + JDK-8233829: javac cannot find non-ASCII module name under\n non-UTF8 environment\n + JDK-8233958: Memory retention due to HttpsURLConnection\n finalizer that serves no purpose\n + JDK-8234011: (zipfs) Memory leak in\n ZipFileSystem.releaseDeflater()\n + JDK-8234058: runtime/CompressedOops/\n /CompressedClassPointers.java fails with \u0027Narrow klass base:\n 0x0000000000000000\u0027 missing from stdout/stderr\n + JDK-8234149: Several regression tests do not dispose Frame at\n end\n + JDK-8234347: \u0027Turkey\u0027 meta time zone does not generate\n composed localized names\n + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/\n /bug6980209.java fails in linux nightly\n + JDK-8234535: Cross compilation fails due to missing CFLAGS\n for the BUILD_CC\n + JDK-8234541: C1 emits an empty message when it inlines\n successfully\n + JDK-8234687: change javap reporting on unknown attributes\n + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK\n 11\n + JDK-8236548: Localized time zone name inconsistency between\n English and other locales\n + JDK-8236617: jtreg test containers/docker/\n /TestMemoryAwareness.java fails after 8226575\n + JDK-8237182: Update copyright header for shenandoah and\n epsilon files\n + JDK-8237888: security/infra/java/security/cert/\n /CertPathValidator/certification/LuxTrustCA.java fails when\n checking validity interval\n + JDK-8237977: Further update\n javax/net/ssl/compatibility/Compatibility.java\n + JDK-8238270: java.net HTTP/2 client does not decrease stream\n count when receives 204 response\n + JDK-8238284: [macos] Zero VM build fails due to an obvious\n typo\n + JDK-8238380: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388: libj2gss/NativeFunc.o \u0027multiple definition\u0027 link\n errors with GCC10\n + JDK-8238448: RSASSA-PSS signature verification fail when\n using certain odd key sizes\n + JDK-8238710: LingeredApp doesn\u0027t log stdout/stderr if exits\n with non-zero code\n + JDK-8239083: C1 assert(known_holder == NULL ||\n (known_holder-\u003eis_instance_klass() \u0026\u0026\n (!known_holder-\u003eis_interface() ||\n ((ciInstanceKlass*)known_holder)-\u003ehas_nonstatic_concrete_methods())),\n \u0027should be non-static concrete method\u0027);\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8240169: javadoc fails to link to non-modular api docs\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8240360: NativeLibraryEvent has wrong library name on\n Linux\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + JDK-8241065: Shenandoah: remove leftover code after\n JDK-8231086\n + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is\n failing on 32bit Windows\n + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:\n java.lang.NullPointerException\n + JDK-8241138: http.nonProxyHosts=* causes\n StringIndexOutOfBoundsException in DefaultProxySelector\n + JDK-8241319: WB_GetCodeBlob doesn\u0027t have ResourceMark\n + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java\n fails with OOME\n + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8242184: CRL generation error with RSASSA-PSS\n + JDK-8242283: Can\u0027t start JVM when java home path includes\n non-ASCII character\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8243029: Rewrite javax/net/ssl/compatibility/\n /Compatibility.java with a flexible interop test framework\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8243389: enhance os::pd_print_cpu_info on linux\n + JDK-8243453: java --describe-module failed with non-ASCII\n module name under non-UTF8 environment\n + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on\n HiDPI screens (Windows)\n + JDK-8244087: 2020-04-24 public suffix list update\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8244164: AArch64: jaotc generates incorrect code for\n compressed OOPs with non-zero heap base\n + JDK-8244196: adjust output in os_linux\n + JDK-8244225: stringop-overflow warning on strncpy call from\n compile_the_world_in\n + JDK-8244287: JFR: Methods samples have line number 0\n + JDK-8244703: \u0027platform encoding not initialized\u0027 exceptions\n with debugger, JNI\n + JDK-8244719: CTW: C2 compilation fails with\n \u0027assert(!VerifyHashTableKeys || _hash_lock == 0) failed:\n remove node from hash table before modifying it\u0027\n + JDK-8244729: Shenandoah: remove resolve paths from\n SBSA::generate_shenandoah_lrb\n + JDK-8244763: Update --release 8 symbol information after JSR\n 337 MR3\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8245151: jarsigner should not raise duplicate warnings on\n verification\n + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9\n + JDK-8245714: \u0027Bad graph detected in build_loop_late\u0027 when\n loads are pinned on loop limit check uncommon branch\n + JDK-8245801: StressRecompilation triggers assert \u0027redundunt\n OSR recompilation detected. memory leak in CodeCache!\u0027\n + JDK-8245832: JDK build make-static-libs should build all JDK\n libraries\n + JDK-8245880: Shenandoah: check class unloading flag early in\n concurrent code root scan\n + JDK-8245981: Upgrade to jQuery 3.5.1\n + JDK-8246027: Minimal fastdebug build broken after JDK-8245801\n + JDK-8246094: [macos] Sound Recording and playback is not\n working\n + JDK-8246153: TestEliminateArrayCopy fails with\n -XX:+StressReflectiveCode\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest\n fails with AssertionError\n + JDK-8246203: Segmentation fault in verification due to stack\n overflow with -XX:+VerifyIterativeGVN\n + JDK-8246330: Add TLS Tests for Legacy ECDSA curves\n + JDK-8246453: TestClone crashes with \u0027all collected exceptions\n must come from the same place\u0027\n + JDK-8247246: Add explicit ResolvedJavaType.link and expose\n presence of default methods\n + JDK-8247350: [aarch64] assert(false) failed: wrong size of\n mach node\n + JDK-8247502: PhaseStringOpts crashes while optimising\n effectively dead code\n + JDK-8247615: Initialize the bytes left for the heap sampler\n + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV\n in SBC2Support::pin_and_expand\n + JDK-8247874: Replacement in VersionProps.java.template not\n working when --with-vendor-bug-url contains \u0027\u0026\u0027\n + JDK-8247979: aarch64: missing side effect of killing flags\n for clearArray_reg_reg\n + JDK-8248214: Add paddings for TaskQueueSuper to reduce\n false-sharing cache contention\n + JDK-8248219: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n + JDK-8248348: Regression caused by the update to BCEL 6.0\n + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to\n jtreg 5.1\n + JDK-8248495: [macos] zerovm is broken due to libffi headers\n location\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8248987: AOT\u0027s Linker.java seems to eagerly fail-fast on\n Windows\n + JDK-8249159: Downport test rework for SSLSocketTemplate from\n 8224650\n + JDK-8249215: JFrame::setVisible crashed with\n -Dfile.encoding=UTF-8 on Japanese Windows.\n + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is\n not highlighted in GTKLookAndFeel\n + JDK-8249255: Build fails if source code in cygwin home dir\n + JDK-8249277: TestVerifyIterativeGVN.java is failing with\n timeout in OpenJDK 11\n + JDK-8249278: Revert JDK-8226253 which breaks the spec of\n AccessibleState.SHOWING for JList\n + JDK-8249560: Shenandoah: Fix racy GC request handling\n + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle\n + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should\n account for corner cases\n + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when\n requesting TGS Kerberos tickets\n + JDK-8250609: C2 crash in IfNode::fold_compares\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8250755: Better cleanup for\n jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java\n + JDK-8250787: Provider.put no longer registering aliases in\n FIPS env\n + JDK-8250826: jhsdb does not work with coredump which comes\n from Substrate VM\n + JDK-8250827: Shenandoah: needs to reset/finish StringTable\u0027s\n dead count before/after parallel walk\n + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check\n the bounds\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java\n test failure\n + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with\n I-U\n + JDK-8251469: Better cleanup for\n test/jdk/javax/imageio/SetOutput.java\n + JDK-8251487: Shenandoah: missing detail timing tracking for\n final mark cleaning phase\n + JDK-8252120: compiler/oracle/TestCompileCommand.java\n misspells \u0027occured\u0027\n + JDK-8252157: JDK-8231209 11u backport breaks jmm binary\n compatibility\n + JDK-8252258: [11u] JDK-8242154 changes the default vendor\n + JDK-8252804: [test] Fix \u0027ReleaseDeflater.java\u0027 test after\n downport of 8234011\n + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)\n in JDK 11\n + JDK-8253283: [11u] Test build/translations/\n /VerifyTranslations.java failing after JDK-8252258\n + JDK-8253813: Backout JDK-8244287 from 11u: it causes several\n crashes\n + Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*,\n bool)\u0027 introduced in jdk 11.0.9\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1994", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1994-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1994-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1994-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2020-11-21T11:23:12Z", "generator": { "date": "2020-11-21T11:23:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1994-1", "initial_release_date": "2020-11-21T11:23:12Z", "revision_history": [ { "date": "2020-11-21T11:23:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "product": { "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "product_id": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "product_id": "java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64", "product": { "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64", "product_id": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586" }, "product_reference": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-accessibility-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-demo-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-devel-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-headless-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-javadoc-11.0.9.0-lp152.2.6.2.noarch", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-jmods-11.0.9.0-lp152.2.6.2.x86_64", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.i586", "openSUSE Leap 15.2:java-11-openjdk-src-11.0.9.0-lp152.2.6.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-21T11:23:12Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
opensuse-su-2024:10871-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-11-openjdk-11.0.12.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10871", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10871-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-11-openjdk-11.0.12.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10871-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2024:10872-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-13-openjdk-13.0.8.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10872", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10872-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-13-openjdk-13.0.8.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10872-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2024:10876-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10876", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10876-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10165 page", "url": "https://www.suse.com/security/cve/CVE-2016-10165/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5546 page", "url": "https://www.suse.com/security/cve/CVE-2016-5546/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5547 page", "url": "https://www.suse.com/security/cve/CVE-2016-5547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5548 page", "url": "https://www.suse.com/security/cve/CVE-2016-5548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5549 page", "url": "https://www.suse.com/security/cve/CVE-2016-5549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5552 page", "url": "https://www.suse.com/security/cve/CVE-2016-5552/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9840 page", "url": "https://www.suse.com/security/cve/CVE-2016-9840/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9843 page", "url": "https://www.suse.com/security/cve/CVE-2016-9843/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10053 page", "url": "https://www.suse.com/security/cve/CVE-2017-10053/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10067 page", "url": "https://www.suse.com/security/cve/CVE-2017-10067/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10074 page", "url": "https://www.suse.com/security/cve/CVE-2017-10074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10078 page", "url": "https://www.suse.com/security/cve/CVE-2017-10078/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10081 page", "url": "https://www.suse.com/security/cve/CVE-2017-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10086 page", "url": "https://www.suse.com/security/cve/CVE-2017-10086/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10087 page", "url": "https://www.suse.com/security/cve/CVE-2017-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10089 page", "url": "https://www.suse.com/security/cve/CVE-2017-10089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10090 page", "url": "https://www.suse.com/security/cve/CVE-2017-10090/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10096 page", "url": "https://www.suse.com/security/cve/CVE-2017-10096/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10101 page", "url": "https://www.suse.com/security/cve/CVE-2017-10101/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10102 page", "url": "https://www.suse.com/security/cve/CVE-2017-10102/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10105 page", "url": "https://www.suse.com/security/cve/CVE-2017-10105/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10107 page", "url": "https://www.suse.com/security/cve/CVE-2017-10107/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10108 page", "url": "https://www.suse.com/security/cve/CVE-2017-10108/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10109 page", "url": "https://www.suse.com/security/cve/CVE-2017-10109/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10110 page", "url": "https://www.suse.com/security/cve/CVE-2017-10110/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10111 page", "url": "https://www.suse.com/security/cve/CVE-2017-10111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10114 page", "url": "https://www.suse.com/security/cve/CVE-2017-10114/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10115 page", "url": "https://www.suse.com/security/cve/CVE-2017-10115/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10116 page", "url": "https://www.suse.com/security/cve/CVE-2017-10116/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10118 page", "url": "https://www.suse.com/security/cve/CVE-2017-10118/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10125 page", "url": "https://www.suse.com/security/cve/CVE-2017-10125/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10135 page", "url": "https://www.suse.com/security/cve/CVE-2017-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10176 page", "url": "https://www.suse.com/security/cve/CVE-2017-10176/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10193 page", "url": "https://www.suse.com/security/cve/CVE-2017-10193/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10198 page", "url": "https://www.suse.com/security/cve/CVE-2017-10198/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10243 page", "url": "https://www.suse.com/security/cve/CVE-2017-10243/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10274 page", "url": "https://www.suse.com/security/cve/CVE-2017-10274/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10281 page", "url": "https://www.suse.com/security/cve/CVE-2017-10281/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10285 page", "url": "https://www.suse.com/security/cve/CVE-2017-10285/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10295 page", "url": "https://www.suse.com/security/cve/CVE-2017-10295/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10345 page", "url": "https://www.suse.com/security/cve/CVE-2017-10345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10346 page", "url": "https://www.suse.com/security/cve/CVE-2017-10346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10347 page", "url": "https://www.suse.com/security/cve/CVE-2017-10347/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10348 page", "url": "https://www.suse.com/security/cve/CVE-2017-10348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10349 page", "url": "https://www.suse.com/security/cve/CVE-2017-10349/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10350 page", "url": "https://www.suse.com/security/cve/CVE-2017-10350/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10355 page", "url": "https://www.suse.com/security/cve/CVE-2017-10355/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10356 page", "url": "https://www.suse.com/security/cve/CVE-2017-10356/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10357 page", "url": "https://www.suse.com/security/cve/CVE-2017-10357/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10388 page", "url": "https://www.suse.com/security/cve/CVE-2017-10388/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3231 page", "url": "https://www.suse.com/security/cve/CVE-2017-3231/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3241 page", "url": "https://www.suse.com/security/cve/CVE-2017-3241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3252 page", "url": "https://www.suse.com/security/cve/CVE-2017-3252/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3253 page", "url": "https://www.suse.com/security/cve/CVE-2017-3253/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3260 page", "url": "https://www.suse.com/security/cve/CVE-2017-3260/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3261 page", "url": "https://www.suse.com/security/cve/CVE-2017-3261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3272 page", "url": "https://www.suse.com/security/cve/CVE-2017-3272/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3289 page", "url": "https://www.suse.com/security/cve/CVE-2017-3289/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3509 page", "url": "https://www.suse.com/security/cve/CVE-2017-3509/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3511 page", "url": "https://www.suse.com/security/cve/CVE-2017-3511/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3512 page", "url": "https://www.suse.com/security/cve/CVE-2017-3512/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3514 page", "url": "https://www.suse.com/security/cve/CVE-2017-3514/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3526 page", "url": "https://www.suse.com/security/cve/CVE-2017-3526/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3533 page", "url": "https://www.suse.com/security/cve/CVE-2017-3533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3539 page", "url": "https://www.suse.com/security/cve/CVE-2017-3539/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3544 page", "url": "https://www.suse.com/security/cve/CVE-2017-3544/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13785 page", "url": "https://www.suse.com/security/cve/CVE-2018-13785/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16435 page", "url": "https://www.suse.com/security/cve/CVE-2018-16435/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2579 page", "url": "https://www.suse.com/security/cve/CVE-2018-2579/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2582 page", "url": "https://www.suse.com/security/cve/CVE-2018-2582/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2588 page", "url": "https://www.suse.com/security/cve/CVE-2018-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2599 page", "url": "https://www.suse.com/security/cve/CVE-2018-2599/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2602 page", "url": "https://www.suse.com/security/cve/CVE-2018-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2603 page", "url": "https://www.suse.com/security/cve/CVE-2018-2603/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2618 page", "url": "https://www.suse.com/security/cve/CVE-2018-2618/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2629 page", "url": "https://www.suse.com/security/cve/CVE-2018-2629/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2633 page", "url": "https://www.suse.com/security/cve/CVE-2018-2633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2634 page", "url": "https://www.suse.com/security/cve/CVE-2018-2634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2637 page", "url": "https://www.suse.com/security/cve/CVE-2018-2637/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2641 page", "url": "https://www.suse.com/security/cve/CVE-2018-2641/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2663 page", "url": "https://www.suse.com/security/cve/CVE-2018-2663/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2677 page", "url": "https://www.suse.com/security/cve/CVE-2018-2677/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2678 page", "url": "https://www.suse.com/security/cve/CVE-2018-2678/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2800 page", "url": "https://www.suse.com/security/cve/CVE-2018-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2815 page", "url": "https://www.suse.com/security/cve/CVE-2018-2815/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2938 page", "url": "https://www.suse.com/security/cve/CVE-2018-2938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3214 page", "url": "https://www.suse.com/security/cve/CVE-2018-3214/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2698 page", "url": "https://www.suse.com/security/cve/CVE-2019-2698/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2842 page", "url": "https://www.suse.com/security/cve/CVE-2019-2842/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2659 page", "url": "https://www.suse.com/security/cve/CVE-2020-2659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10876-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10165", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10165" } ], "notes": [ { "category": "general", "text": "The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10165", "url": "https://www.suse.com/security/cve/CVE-2016-10165" }, { "category": "external", "summary": "SUSE Bug 1021364 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1021364" }, { "category": "external", "summary": "SUSE Bug 1064069 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1064069" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10165" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-5546", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5546" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5546", "url": "https://www.suse.com/security/cve/CVE-2016-5546" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5546", "url": "https://bugzilla.suse.com/1020905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5546" }, { "cve": "CVE-2016-5547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5547" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5547", "url": "https://www.suse.com/security/cve/CVE-2016-5547" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5547", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5547", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5547" }, { "cve": "CVE-2016-5548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5548" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5548", "url": "https://www.suse.com/security/cve/CVE-2016-5548" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5548", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5548", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5548" }, { "cve": "CVE-2016-5549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5549", "url": "https://www.suse.com/security/cve/CVE-2016-5549" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5549", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5549", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5549" }, { "cve": "CVE-2016-5552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5552" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5552", "url": "https://www.suse.com/security/cve/CVE-2016-5552" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5552", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5552", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5552" }, { "cve": "CVE-2016-9840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9840" } ], "notes": [ { "category": "general", "text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9840", "url": "https://www.suse.com/security/cve/CVE-2016-9840" }, { "category": "external", "summary": "SUSE Bug 1003579 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1003579" }, { "category": "external", "summary": "SUSE Bug 1022633 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1022633" }, { "category": "external", "summary": "SUSE Bug 1023215 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1023215" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-9840" }, { "cve": "CVE-2016-9843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9843" } ], "notes": [ { "category": "general", "text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9843", "url": "https://www.suse.com/security/cve/CVE-2016-9843" }, { "category": "external", "summary": "SUSE Bug 1003580 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1003580" }, { "category": "external", "summary": "SUSE Bug 1013882 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1013882" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1116686 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1116686" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9843" }, { "cve": "CVE-2017-10053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10053" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10053", "url": "https://www.suse.com/security/cve/CVE-2017-10053" }, { "category": "external", "summary": "SUSE Bug 1049305 for CVE-2017-10053", "url": "https://bugzilla.suse.com/1049305" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10053" }, { "cve": "CVE-2017-10067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10067" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10067", "url": "https://www.suse.com/security/cve/CVE-2017-10067" }, { "category": "external", "summary": "SUSE Bug 1049306 for CVE-2017-10067", "url": "https://bugzilla.suse.com/1049306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10067" }, { "cve": "CVE-2017-10074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10074" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10074", "url": "https://www.suse.com/security/cve/CVE-2017-10074" }, { "category": "external", "summary": "SUSE Bug 1049307 for CVE-2017-10074", "url": "https://bugzilla.suse.com/1049307" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10074", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10074" }, { "cve": "CVE-2017-10078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10078" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10078", "url": "https://www.suse.com/security/cve/CVE-2017-10078" }, { "category": "external", "summary": "SUSE Bug 1049308 for CVE-2017-10078", "url": "https://bugzilla.suse.com/1049308" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10078", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10078" }, { "cve": "CVE-2017-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10081" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10081", "url": "https://www.suse.com/security/cve/CVE-2017-10081" }, { "category": "external", "summary": "SUSE Bug 1049309 for CVE-2017-10081", "url": "https://bugzilla.suse.com/1049309" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10081", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10081" }, { "cve": "CVE-2017-10086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10086" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10086", "url": "https://www.suse.com/security/cve/CVE-2017-10086" }, { "category": "external", "summary": "SUSE Bug 1049310 for CVE-2017-10086", "url": "https://bugzilla.suse.com/1049310" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10086", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10086" }, { "cve": "CVE-2017-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10087" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10087", "url": "https://www.suse.com/security/cve/CVE-2017-10087" }, { "category": "external", "summary": "SUSE Bug 1049311 for CVE-2017-10087", "url": "https://bugzilla.suse.com/1049311" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10087", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10087" }, { "cve": "CVE-2017-10089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10089" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10089", "url": "https://www.suse.com/security/cve/CVE-2017-10089" }, { "category": "external", "summary": "SUSE Bug 1049312 for CVE-2017-10089", "url": "https://bugzilla.suse.com/1049312" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10089", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10089" }, { "cve": "CVE-2017-10090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10090" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10090", "url": "https://www.suse.com/security/cve/CVE-2017-10090" }, { "category": "external", "summary": "SUSE Bug 1049313 for CVE-2017-10090", "url": "https://bugzilla.suse.com/1049313" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10090", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10090" }, { "cve": "CVE-2017-10096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10096" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10096", "url": "https://www.suse.com/security/cve/CVE-2017-10096" }, { "category": "external", "summary": "SUSE Bug 1049314 for CVE-2017-10096", "url": "https://bugzilla.suse.com/1049314" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10096", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10096" }, { "cve": "CVE-2017-10101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10101" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10101", "url": "https://www.suse.com/security/cve/CVE-2017-10101" }, { "category": "external", "summary": "SUSE Bug 1049315 for CVE-2017-10101", "url": "https://bugzilla.suse.com/1049315" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10101", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10101" }, { "cve": "CVE-2017-10102", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10102" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10102", "url": "https://www.suse.com/security/cve/CVE-2017-10102" }, { "category": "external", "summary": "SUSE Bug 1049316 for CVE-2017-10102", "url": "https://bugzilla.suse.com/1049316" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10102", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10102" }, { "cve": "CVE-2017-10105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10105" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10105", "url": "https://www.suse.com/security/cve/CVE-2017-10105" }, { "category": "external", "summary": "SUSE Bug 1049317 for CVE-2017-10105", "url": "https://bugzilla.suse.com/1049317" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10105", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10105" }, { "cve": "CVE-2017-10107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10107" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10107", "url": "https://www.suse.com/security/cve/CVE-2017-10107" }, { "category": "external", "summary": "SUSE Bug 1049318 for CVE-2017-10107", "url": "https://bugzilla.suse.com/1049318" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10107", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-10107" }, { "cve": "CVE-2017-10108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10108" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10108", "url": "https://www.suse.com/security/cve/CVE-2017-10108" }, { "category": "external", "summary": "SUSE Bug 1049319 for CVE-2017-10108", "url": "https://bugzilla.suse.com/1049319" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10108", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10108" }, { "cve": "CVE-2017-10109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10109" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10109", "url": "https://www.suse.com/security/cve/CVE-2017-10109" }, { "category": "external", "summary": "SUSE Bug 1049320 for CVE-2017-10109", "url": "https://bugzilla.suse.com/1049320" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10109", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10109" }, { "cve": "CVE-2017-10110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10110" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10110", "url": "https://www.suse.com/security/cve/CVE-2017-10110" }, { "category": "external", "summary": "SUSE Bug 1049321 for CVE-2017-10110", "url": "https://bugzilla.suse.com/1049321" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10110", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10110" }, { "cve": "CVE-2017-10111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10111" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10111", "url": "https://www.suse.com/security/cve/CVE-2017-10111" }, { "category": "external", "summary": "SUSE Bug 1049322 for CVE-2017-10111", "url": "https://bugzilla.suse.com/1049322" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10111", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10111" }, { "cve": "CVE-2017-10114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10114" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10114", "url": "https://www.suse.com/security/cve/CVE-2017-10114" }, { "category": "external", "summary": "SUSE Bug 1049323 for CVE-2017-10114", "url": "https://bugzilla.suse.com/1049323" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10114", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10114" }, { "cve": "CVE-2017-10115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10115" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10115", "url": "https://www.suse.com/security/cve/CVE-2017-10115" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1049324 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1049324" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-10115" }, { "cve": "CVE-2017-10116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10116" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10116", "url": "https://www.suse.com/security/cve/CVE-2017-10116" }, { "category": "external", "summary": "SUSE Bug 1049325 for CVE-2017-10116", "url": "https://bugzilla.suse.com/1049325" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10116", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10116" }, { "cve": "CVE-2017-10118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10118" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10118", "url": "https://www.suse.com/security/cve/CVE-2017-10118" }, { "category": "external", "summary": "SUSE Bug 1049326 for CVE-2017-10118", "url": "https://bugzilla.suse.com/1049326" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10118", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10118" }, { "cve": "CVE-2017-10125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10125" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10125", "url": "https://www.suse.com/security/cve/CVE-2017-10125" }, { "category": "external", "summary": "SUSE Bug 1049327 for CVE-2017-10125", "url": "https://bugzilla.suse.com/1049327" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10125", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10125" }, { "cve": "CVE-2017-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10135" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10135", "url": "https://www.suse.com/security/cve/CVE-2017-10135" }, { "category": "external", "summary": "SUSE Bug 1049328 for CVE-2017-10135", "url": "https://bugzilla.suse.com/1049328" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10135", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10135" }, { "cve": "CVE-2017-10176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10176" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10176", "url": "https://www.suse.com/security/cve/CVE-2017-10176" }, { "category": "external", "summary": "SUSE Bug 1049329 for CVE-2017-10176", "url": "https://bugzilla.suse.com/1049329" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10176", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10176" }, { "cve": "CVE-2017-10193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10193" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10193", "url": "https://www.suse.com/security/cve/CVE-2017-10193" }, { "category": "external", "summary": "SUSE Bug 1049330 for CVE-2017-10193", "url": "https://bugzilla.suse.com/1049330" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10193", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-10193" }, { "cve": "CVE-2017-10198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10198" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10198", "url": "https://www.suse.com/security/cve/CVE-2017-10198" }, { "category": "external", "summary": "SUSE Bug 1049331 for CVE-2017-10198", "url": "https://bugzilla.suse.com/1049331" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10198", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10198" }, { "cve": "CVE-2017-10243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10243" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10243", "url": "https://www.suse.com/security/cve/CVE-2017-10243" }, { "category": "external", "summary": "SUSE Bug 1049332 for CVE-2017-10243", "url": "https://bugzilla.suse.com/1049332" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10243", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10243" }, { "cve": "CVE-2017-10274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10274" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10274", "url": "https://www.suse.com/security/cve/CVE-2017-10274" }, { "category": "external", "summary": "SUSE Bug 1064071 for CVE-2017-10274", "url": "https://bugzilla.suse.com/1064071" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10274" }, { "cve": "CVE-2017-10281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10281" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10281", "url": "https://www.suse.com/security/cve/CVE-2017-10281" }, { "category": "external", "summary": "SUSE Bug 1064072 for CVE-2017-10281", "url": "https://bugzilla.suse.com/1064072" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10281", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10281" }, { "cve": "CVE-2017-10285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10285" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10285", "url": "https://www.suse.com/security/cve/CVE-2017-10285" }, { "category": "external", "summary": "SUSE Bug 1064073 for CVE-2017-10285", "url": "https://bugzilla.suse.com/1064073" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10285", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10285" }, { "cve": "CVE-2017-10295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10295" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10295", "url": "https://www.suse.com/security/cve/CVE-2017-10295" }, { "category": "external", "summary": "SUSE Bug 1064075 for CVE-2017-10295", "url": "https://bugzilla.suse.com/1064075" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10295", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10295" }, { "cve": "CVE-2017-10345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10345" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10345", "url": "https://www.suse.com/security/cve/CVE-2017-10345" }, { "category": "external", "summary": "SUSE Bug 1064077 for CVE-2017-10345", "url": "https://bugzilla.suse.com/1064077" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10345", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-10345" }, { "cve": "CVE-2017-10346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10346" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10346", "url": "https://www.suse.com/security/cve/CVE-2017-10346" }, { "category": "external", "summary": "SUSE Bug 1064078 for CVE-2017-10346", "url": "https://bugzilla.suse.com/1064078" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10346", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10346" }, { "cve": "CVE-2017-10347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10347" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10347", "url": "https://www.suse.com/security/cve/CVE-2017-10347" }, { "category": "external", "summary": "SUSE Bug 1064079 for CVE-2017-10347", "url": "https://bugzilla.suse.com/1064079" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10347", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10347" }, { "cve": "CVE-2017-10348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10348" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10348", "url": "https://www.suse.com/security/cve/CVE-2017-10348" }, { "category": "external", "summary": "SUSE Bug 1064080 for CVE-2017-10348", "url": "https://bugzilla.suse.com/1064080" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10348", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10348" }, { "cve": "CVE-2017-10349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10349" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10349", "url": "https://www.suse.com/security/cve/CVE-2017-10349" }, { "category": "external", "summary": "SUSE Bug 1064081 for CVE-2017-10349", "url": "https://bugzilla.suse.com/1064081" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10349", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10349" }, { "cve": "CVE-2017-10350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10350" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10350", "url": "https://www.suse.com/security/cve/CVE-2017-10350" }, { "category": "external", "summary": "SUSE Bug 1064082 for CVE-2017-10350", "url": "https://bugzilla.suse.com/1064082" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10350", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10350" }, { "cve": "CVE-2017-10355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10355" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10355", "url": "https://www.suse.com/security/cve/CVE-2017-10355" }, { "category": "external", "summary": "SUSE Bug 1064083 for CVE-2017-10355", "url": "https://bugzilla.suse.com/1064083" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10355", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10355" }, { "cve": "CVE-2017-10356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10356" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10356", "url": "https://www.suse.com/security/cve/CVE-2017-10356" }, { "category": "external", "summary": "SUSE Bug 1064084 for CVE-2017-10356", "url": "https://bugzilla.suse.com/1064084" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10356", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10356" }, { "cve": "CVE-2017-10357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10357" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10357", "url": "https://www.suse.com/security/cve/CVE-2017-10357" }, { "category": "external", "summary": "SUSE Bug 1064085 for CVE-2017-10357", "url": "https://bugzilla.suse.com/1064085" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10357", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10357" }, { "cve": "CVE-2017-10388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10388", "url": "https://www.suse.com/security/cve/CVE-2017-10388" }, { "category": "external", "summary": "SUSE Bug 1064086 for CVE-2017-10388", "url": "https://bugzilla.suse.com/1064086" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10388", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10388" }, { "cve": "CVE-2017-3231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3231" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3231", "url": "https://www.suse.com/security/cve/CVE-2017-3231" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3231", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3231", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3231" }, { "cve": "CVE-2017-3241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3241" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3241", "url": "https://www.suse.com/security/cve/CVE-2017-3241" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3241" }, { "cve": "CVE-2017-3252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3252" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3252", "url": "https://www.suse.com/security/cve/CVE-2017-3252" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3252", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3252", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3252" }, { "cve": "CVE-2017-3253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3253" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3253", "url": "https://www.suse.com/security/cve/CVE-2017-3253" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3253", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3253", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3253" }, { "cve": "CVE-2017-3260", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3260" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3260", "url": "https://www.suse.com/security/cve/CVE-2017-3260" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3260", "url": "https://bugzilla.suse.com/1020905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-3260" }, { "cve": "CVE-2017-3261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3261" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3261", "url": "https://www.suse.com/security/cve/CVE-2017-3261" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3261", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3261", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3261" }, { "cve": "CVE-2017-3272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3272" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3272", "url": "https://www.suse.com/security/cve/CVE-2017-3272" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3272", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3272", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3272" }, { "cve": "CVE-2017-3289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3289" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3289", "url": "https://www.suse.com/security/cve/CVE-2017-3289" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-3289" }, { "cve": "CVE-2017-3509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3509" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3509", "url": "https://www.suse.com/security/cve/CVE-2017-3509" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3509", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3509", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3509" }, { "cve": "CVE-2017-3511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3511" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3511", "url": "https://www.suse.com/security/cve/CVE-2017-3511" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3511", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3511", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3511" }, { "cve": "CVE-2017-3512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3512" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3512", "url": "https://www.suse.com/security/cve/CVE-2017-3512" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3512", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3512", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3512" }, { "cve": "CVE-2017-3514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3514" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3514", "url": "https://www.suse.com/security/cve/CVE-2017-3514" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3514", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3514", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3514" }, { "cve": "CVE-2017-3526", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3526" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3526", "url": "https://www.suse.com/security/cve/CVE-2017-3526" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3526", "url": "https://bugzilla.suse.com/1034849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3526" }, { "cve": "CVE-2017-3533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3533" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3533", "url": "https://www.suse.com/security/cve/CVE-2017-3533" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3533", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3533", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3533" }, { "cve": "CVE-2017-3539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3539" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3539", "url": "https://www.suse.com/security/cve/CVE-2017-3539" }, { "category": "external", "summary": "SUSE Bug 1005522 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1005522" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-3539" }, { "cve": "CVE-2017-3544", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3544" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3544", "url": "https://www.suse.com/security/cve/CVE-2017-3544" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3544", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3544", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3544" }, { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-13785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13785" } ], "notes": [ { "category": "general", "text": "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13785", "url": "https://www.suse.com/security/cve/CVE-2018-13785" }, { "category": "external", "summary": "SUSE Bug 1100687 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1100687" }, { "category": "external", "summary": "SUSE Bug 1112153 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1112153" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13785" }, { "cve": "CVE-2018-16435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16435" } ], "notes": [ { "category": "general", "text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16435", "url": "https://www.suse.com/security/cve/CVE-2018-16435" }, { "category": "external", "summary": "SUSE Bug 1108813 for CVE-2018-16435", "url": "https://bugzilla.suse.com/1108813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16435" }, { "cve": "CVE-2018-2579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2579", "url": "https://www.suse.com/security/cve/CVE-2018-2579" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2579", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2579", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2579" }, { "cve": "CVE-2018-2582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2582" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2582", "url": "https://www.suse.com/security/cve/CVE-2018-2582" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2582", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2582", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2582" }, { "cve": "CVE-2018-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2588" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2588", "url": "https://www.suse.com/security/cve/CVE-2018-2588" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2588", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2588", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2588" }, { "cve": "CVE-2018-2599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2599" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2599", "url": "https://www.suse.com/security/cve/CVE-2018-2599" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2599", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2599", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2599" }, { "cve": "CVE-2018-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2602", "url": "https://www.suse.com/security/cve/CVE-2018-2602" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2602", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2602", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2602" }, { "cve": "CVE-2018-2603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2603" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2603", "url": "https://www.suse.com/security/cve/CVE-2018-2603" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2603", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2603", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2603" }, { "cve": "CVE-2018-2618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2618" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2618", "url": "https://www.suse.com/security/cve/CVE-2018-2618" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2618", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2618", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2618" }, { "cve": "CVE-2018-2629", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2629" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2629", "url": "https://www.suse.com/security/cve/CVE-2018-2629" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2629", "url": "https://bugzilla.suse.com/1076366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2629" }, { "cve": "CVE-2018-2633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2633" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2633", "url": "https://www.suse.com/security/cve/CVE-2018-2633" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2633", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2633", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2633" }, { "cve": "CVE-2018-2634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2634" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2634", "url": "https://www.suse.com/security/cve/CVE-2018-2634" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2634", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2634", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2634" }, { "cve": "CVE-2018-2637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2637" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2637", "url": "https://www.suse.com/security/cve/CVE-2018-2637" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2637", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2637", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2637" }, { "cve": "CVE-2018-2641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2641" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2641", "url": "https://www.suse.com/security/cve/CVE-2018-2641" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2641", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2641", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2641" }, { "cve": "CVE-2018-2663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2663" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2663", "url": "https://www.suse.com/security/cve/CVE-2018-2663" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2663", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2663", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2663" }, { "cve": "CVE-2018-2677", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2677" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2677", "url": "https://www.suse.com/security/cve/CVE-2018-2677" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2677", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2677", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2677" }, { "cve": "CVE-2018-2678", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2678" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2678", "url": "https://www.suse.com/security/cve/CVE-2018-2678" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2678", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2678", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2678" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2800", "url": "https://www.suse.com/security/cve/CVE-2018-2800" }, { "category": "external", "summary": "SUSE Bug 1090030 for CVE-2018-2800", "url": "https://bugzilla.suse.com/1090030" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2800", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2800" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2815" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2815", "url": "https://www.suse.com/security/cve/CVE-2018-2815" }, { "category": "external", "summary": "SUSE Bug 1090033 for CVE-2018-2815", "url": "https://bugzilla.suse.com/1090033" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2815" }, { "cve": "CVE-2018-2938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2938" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2938", "url": "https://www.suse.com/security/cve/CVE-2018-2938" }, { "category": "external", "summary": "SUSE Bug 1101644 for CVE-2018-2938", "url": "https://bugzilla.suse.com/1101644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2938" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2018-3214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3214" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3214", "url": "https://www.suse.com/security/cve/CVE-2018-3214" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3214" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2698" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2698", "url": "https://www.suse.com/security/cve/CVE-2019-2698" }, { "category": "external", "summary": "SUSE Bug 1132729 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1132729" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2698" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2842" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2842", "url": "https://www.suse.com/security/cve/CVE-2019-2842" }, { "category": "external", "summary": "SUSE Bug 1141786 for CVE-2019-2842", "url": "https://bugzilla.suse.com/1141786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2842" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2659" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2659", "url": "https://www.suse.com/security/cve/CVE-2020-2659" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2659", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2659", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2659" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2020:2048-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk fixes the following issues:\n\n- Fix regression \u00278250861: Crash in MinINode::Ideal(PhaseGVN*, bool)\u0027,\n introduced in October 2020 CPU.\n\n- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,\n bsc#1174157, and October 2020 CPU, bsc#1177943)\n * New features\n + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7\n + PR3796: Allow the number of curves supported to be specified\n * Security fixes\n + JDK-8028431, CVE-2020-14579: NullPointerException in\n DerValue.equals(DerValue)\n + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in\n sun.security.util.DerInputStream.getUnalignedBitString()\n + JDK-8230613: Better ASCII conversions\n + JDK-8231800: Better listing of arrays\n + JDK-8232014: Expand DTD support\n + JDK-8233255: Better Swing Buttons\n + JDK-8233624: Enhance JNI linkage\n + JDK-8234032: Improve basic calendar services\n + JDK-8234042: Better factory production of certificates\n + JDK-8234418: Better parsing with CertificateFactory\n + JDK-8234836: Improve serialization handling\n + JDK-8236191: Enhance OID processing\n + JDK-8236196: Improve string pooling\n + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class\n + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior\n + JDK-8237592, CVE-2020-14577: Enhance certificate verification\n + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts\n + JDK-8237995, CVE-2020-14782: Enhance certificate processing\n + JDK-8238002, CVE-2020-14581: Better matrix operations\n + JDK-8238804: Enhance key handling process\n + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable\n + JDK-8238843: Enhanced font handing\n + JDK-8238920, CVE-2020-14583: Better Buffer support\n + JDK-8238925: Enhance WAV file playback\n + JDK-8240119, CVE-2020-14593: Less Affine Transformations\n + JDK-8240124: Better VM Interning\n + JDK-8240482: Improved WAV file playback\n + JDK-8241114, CVE-2020-14792: Better range handling\n + JDK-8241379: Update JCEKS support\n + JDK-8241522: Manifest improved jar headers redux\n + JDK-8242136, CVE-2020-14621: Better XML namespace handling\n + JDK-8242680, CVE-2020-14796: Improved URI Support\n + JDK-8242685, CVE-2020-14797: Better Path Validation\n + JDK-8242695, CVE-2020-14798: Enhanced buffer support\n + JDK-8243302: Advanced class supports\n + JDK-8244136, CVE-2020-14803: Improved Buffer supports\n + JDK-8244479: Further constrain certificates\n + JDK-8244955: Additional Fix for JDK-8240124\n + JDK-8245407: Enhance zoning of times\n + JDK-8245412: Better class definitions\n + JDK-8245417: Improve certificate chain handling\n + JDK-8248574: Improve jpeg processing\n + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit\n + JDK-8253019: Enhanced JPEG decoding\n * Import of OpenJDK 8 u262 build 01\n + JDK-4949105: Access Bridge lacks html tags parsing\n + JDK-8003209: JFR events for network utilization\n + JDK-8030680: 292 cleanup from default method code assessment\n + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java\n and some tests failed on windows intermittently\n + JDK-8041626: Shutdown tracing event\n + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp\n + JDK-8149338: JVM Crash caused by Marlin renderer not handling\n NaN coordinates\n + JDK-8151582: (ch) test java/nio/channels/\n /AsyncCloseAndInterrupt.java failing due to \u0027Connection\n succeeded\u0027\n + JDK-8165675: Trace event for thread park has incorrect unit\n for timeout\n + JDK-8176182: 4 security tests are not run\n + JDK-8178910: Problemlist sample tests\n + JDK-8183925: Decouple crash protection from watcher thread\n + JDK-8191393: Random crashes during cfree+0x1c\n + JDK-8195817: JFR.stop should require name of recording\n + JDK-8195818: JFR.start should increase autogenerated name by\n one\n + JDK-8195819: Remove recording=x from jcmd JFR.check output\n + JDK-8199712: Flight Recorder\n + JDK-8202578: Revisit location for class unload events\n + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on\n missing events\n + JDK-8203287: Zero fails to build after JDK-8199712 (Flight\n Recorder)\n + JDK-8203346: JFR: Inconsistent signature of\n jfr_add_string_constant\n + JDK-8203664: JFR start failure after AppCDS archive created\n with JFR StartFlightRecording\n + JDK-8203921: JFR thread sampling is missing fixes from\n JDK-8194552\n + JDK-8203929: Limit amount of data for JFR.dump\n + JDK-8205516: JFR tool\n + JDK-8207392: [PPC64] Implement JFR profiling\n + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first\n classloader which calls it\n + JDK-8209960: -Xlog:jfr* doesn\u0027t work with the JFR\n + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()\n + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD\n 1.0.7\n + JDK-8211239: Build fails without JFR: empty JFR events\n signatures mismatch\n + JDK-8212232: Wrong metadata for the configuration of the\n cutoff for old object sample events\n + JDK-8213015: Inconsistent settings between JFR.configure and\n -XX:FlightRecorderOptions\n + JDK-8213421: Line number information for execution samples\n always 0\n + JDK-8213617: JFR should record the PID of the recorded process\n + JDK-8213734: SAXParser.parse(File, ..) does not close\n resources when Exception occurs.\n + JDK-8213914: [TESTBUG] Several JFR VM events are not covered\n by tests\n + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by\n test\n + JDK-8213966: The ZGC JFR events should be marked as\n experimental\n + JDK-8214542: JFR: Old Object Sample event slow on a deep heap\n in debug builds\n + JDK-8214750: Unnecessary \u003cp\u003e tags in jfr classes\n + JDK-8214896: JFR Tool left files behind\n + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java\n fails with UnsatisfiedLinkError\n + JDK-8214925: JFR tool fails to execute\n + JDK-8215175: Inconsistencies in JFR event metadata\n + JDK-8215237: jdk.jfr.Recording javadoc does not compile\n + JDK-8215284: Reduce noise induced by periodic task\n getFileSize()\n + JDK-8215355: Object monitor deadlock with no threads holding\n the monitor (using jemalloc 5.1)\n + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails\n + JDK-8215771: The jfr tool should pretty print reference chains\n + JDK-8216064: -XX:StartFlightRecording:settings= doesn\u0027t work\n properly\n + JDK-8216486: Possibility of integer overflow in\n JfrThreadSampler::run()\n + JDK-8216528: test/jdk/java/rmi/transport/\n /runtimeThreadInheritanceLeak/\n /RuntimeThreadInheritanceLeak.java failing with Xcomp\n + JDK-8216559: [JFR] Native libraries not correctly parsed from\n /proc/self/maps\n + JDK-8216578: Remove unused/obsolete method in JFR code\n + JDK-8216995: Clean up JFR command line processing\n + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some\n systems due to process surviving SIGINT\n + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR\n TestShutdownEvent\n + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly\n + JDK-8223147: JFR Backport\n + JDK-8223689: Add JFR Thread Sampling Support\n + JDK-8223690: Add JFR BiasedLock Event Support\n + JDK-8223691: Add JFR G1 Region Type Change Event Support\n + JDK-8223692: Add JFR G1 Heap Summary Event Support\n + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:\n invariant\n + JDK-8224475: JTextPane does not show images in HTML rendering\n + JDK-8226253: JAWS reports wrong number of radio buttons when\n buttons are hidden.\n + JDK-8226779: [TESTBUG] Test JFR API from Java agent\n + JDK-8226892: ActionListeners on JRadioButtons don\u0027t get\n notified when selection is changed with arrow keys\n + JDK-8227011: Starting a JFR recording in response to JVMTI\n VMInit and / or Java agent premain corrupts memory\n + JDK-8227605: Kitchensink fails \u0027assert((((klass)-\u003etrace_id()\n \u0026 (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))\n failed: invariant\u0027\n + JDK-8229366: JFR backport allows unchecked writing to memory\n + JDK-8229401: Fix JFR code cache test failures\n + JDK-8229708: JFR backport code does not initialize\n + JDK-8229873: 8229401 broke jdk8u-jfr-incubator\n + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on\n Windows\n + JDK-8230707: JFR related tests are failing\n + JDK-8230782: Robot.createScreenCapture() fails if\n \u0027awt.robot.gtk\u0027 is set to false\n + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on\n unix misses ReleaseStringUTFChars in early return\n + JDK-8230947: TestLookForUntestedEvents.java is failing after\n JDK-8230707\n + JDK-8231995: two jtreg tests failed after 8229366 is fixed\n + JDK-8233623: Add classpath exception to copyright in\n EventHandlerProxyCreator.java file\n + JDK-8236002: CSR for JFR backport suggests not leaving out\n the package-info\n + JDK-8236008: Some backup files were accidentally left in the\n hotspot tree\n + JDK-8236074: Missed package-info\n + JDK-8236174: Should update javadoc since tags\n + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport\n + JDK-8238452: Keytool generates wrong expiration date if\n validity is set to 2050/01/01\n + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when\n there are external FIPS modules in the NSSDB\n + JDK-8238589: Necessary code cleanup in JFR for JDK8u\n + JDK-8238590: Enable JFR by default during compilation in 8u\n + JDK-8239055: Wrong implementation of VMState.hasListener\n + JDK-8239476: JDK-8238589 broke windows build by moving\n OrderedPair\n + JDK-8239479: minimal1 and zero builds are failing\n + JDK-8239867: correct over use of INCLUDE_JFR macro\n + JDK-8240375: Disable JFR by default for July 2020 release\n + JDK-8241444: Metaspace::_class_vsm not initialized if\n compressed class pointers are disabled\n + JDK-8241902: AIX Build broken after integration of\n JDK-8223147 (JFR Backport)\n + JDK-8242788: Non-PCH build is broken after JDK-8191393\n * Import of OpenJDK 8 u262 build 02\n + JDK-8130737: AffineTransformOp can\u0027t handle child raster with\n non-zero x-offset\n + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation\n in java/awt/image/Raster/TestChildRasterOp.java\n + JDK-8230926: [macosx] Two apostrophes are entered instead of\n one with \u0027U.S. International - PC\u0027 layout\n + JDK-8240576: JVM crashes after transformation in C2\n IdealLoopTree::merge_many_backedges\n + JDK-8242883: Incomplete backport of JDK-8078268: backport\n test part\n * Import of OpenJDK 8 u262 build 03\n + JDK-8037866: Replace the Fun class in tests with lambdas\n + JDK-8146612: C2: Precedence edges specification violated\n + JDK-8150986: serviceability/sa/jmap-hprof/\n /JMapHProfLargeHeapTest.java failing because expects HPROF\n JAVA PROFILE 1.0.1 file format\n + JDK-8229888: (zipfs) Updating an existing zip file does not\n preserve original permissions\n + JDK-8230597: Update GIFlib library to the 5.2.1\n + JDK-8230769: BufImg_SetupICM add\n ReleasePrimitiveArrayCritical call in early return\n + JDK-8233880, PR3798: Support compilers with multi-digit major\n version numbers\n + JDK-8239852: java/util/concurrent tests fail with\n -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:\n verification should have failed\n + JDK-8241638: launcher time metrics always report 1 on Linux\n when _JAVA_LAUNCHER_DEBUG set\n + JDK-8243059: Build fails when --with-vendor-name contains a\n comma\n + JDK-8243474: [TESTBUG] removed three tests of 0 bytes\n + JDK-8244461: [JDK 8u] Build fails with glibc 2.32\n + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()\n returns wrong result\n * Import of OpenJDK 8 u262 build 04\n + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn\u0027t\n throw NPE if timeout is less than, or equal to zero when unit\n == null\n + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering\n + JDK-8171934:\n ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()\n does not recognize OpenJDK\u0027s HotSpot VM\n + JDK-8196969: JTreg Failure:\n serviceability/sa/ClhsdbJstack.java causes NPE\n + JDK-8243539: Copyright info (Year) should be updated for fix\n of 8241638\n + JDK-8244777: ClassLoaderStats VM Op uses constant hash value\n * Import of OpenJDK 8 u262 build 05\n + JDK-7147060: com/sun/org/apache/xml/internal/security/\n /transforms/ClassLoaderTest.java doesn\u0027t run in agentvm mode\n + JDK-8178374: Problematic ByteBuffer handling in\n CipherSpi.bufferCrypt method\n + JDK-8181841: A TSA server returns timestamp with precision\n higher than milliseconds\n + JDK-8227269: Slow class loading when running with JDWP\n + JDK-8229899: Make java.io.File.isInvalid() less racy\n + JDK-8236996: Incorrect Roboto font rendering on Windows with\n subpixel antialiasing\n + JDK-8241750: x86_32 build failure after JDK-8227269\n + JDK-8244407: JVM crashes after transformation in C2\n IdealLoopTree::split_fall_in\n + JDK-8244843: JapanEraNameCompatTest fails\n * Import of OpenJDK 8 u262 build 06\n + JDK-8246223: Windows build fails after JDK-8227269\n * Import of OpenJDK 8 u262 build 07\n + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and\n Jfr:on_vm_start() start-up order for correct option parsing\n + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a\n + JDK-8245167: Top package in method profiling shows null in JMC\n + JDK-8246703: [TESTBUG] Add test for JDK-8233197\n * Import of OpenJDK 8 u262 build 08\n + JDK-8220293: Deadlock in JFR string pool\n + JDK-8225068: Remove DocuSign root certificate that is\n expiring in May 2020\n + JDK-8225069: Remove Comodo root certificate that is expiring\n in May 2020\n * Import of OpenJDK 8 u262 build 09\n + JDK-8248399: Build installs jfr binary when JFR is disabled\n * Import of OpenJDK 8 u262 build 10\n + JDK-8248715: New JavaTimeSupplementary localisation for \u0027in\u0027\n installed in wrong package\n * Import of OpenJDK 8 u265 build 01\n + JDK-8249677: Regression in 8u after JDK-8237117: Better\n ForkJoinPool behavior\n + JDK-8250546: Expect changed behaviour reported in JDK-8249846\n * Import of OpenJDK 8 u272 build 01\n + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY\n test/compiler/7177917/Test7177917.java\n + JDK-8035493: JVMTI PopFrame capability must instruct\n compilers not to prune locals\n + JDK-8036088: Replace strtok() with its safe equivalent\n strtok_s() in DefaultProxySelector.c\n + JDK-8039082: [TEST_BUG] Test java/awt/dnd/\n /BadSerializationTest/BadSerializationTest.java fails\n + JDK-8075774: Small readability and performance improvements\n for zipfs\n + JDK-8132206: move ScanTest.java into OpenJDK\n + JDK-8132376: Add @requires os.family to the client tests with\n access to internal OS-specific API\n + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java\n + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/\n /appletviewer/IOExceptionIfEncodedURLTest/\n /IOExceptionIfEncodedURLTest.sh\n + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/\n /MTGraphicsAccessTest.java hangs on Win. 8\n + JDK-8151788: NullPointerException from ntlm.Client.type3\n + JDK-8151834: Test SmallPrimeExponentP.java times out\n intermittently\n + JDK-8153430: jdk regression test MletParserLocaleTest,\n ParserInfiniteLoopTest reduce default timeout\n + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary\n public\n + JDK-8156169: Some sound tests rarely hangs because of\n incorrect synchronization\n + JDK-8165936: Potential Heap buffer overflow when seaching\n timezone info files\n + JDK-8166148: Fix for JDK-8165936 broke solaris builds\n + JDK-8167300: Scheduling failures during gcm should be fatal\n + JDK-8167615: Opensource unit/regression tests for JavaSound\n + JDK-8172012: [TEST_BUG] delays needed in\n javax/swing/JTree/4633594/bug4633594.java\n + JDK-8177628: Opensource unit/regression tests for ImageIO\n + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java\n + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/\n /AppletContextTest/BadPluginConfigurationTest.sh\n + JDK-8193137: Nashorn crashes when given an empty script file\n + JDK-8194298: Add support for per Socket configuration of TCP\n keepalive\n + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java\n throws error\n + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java\n fails\n + JDK-8210147: adjust some WSAGetLastError usages in windows\n network coding\n + JDK-8211714: Need to update vm_version.cpp to recognise\n VS2017 minor versions\n + JDK-8214862: assert(proj != __null) at compile.cpp:3251\n + JDK-8217606: LdapContext#reconnect always opens a new\n connection\n + JDK-8217647: JFR: recordings on 32-bit systems unreadable\n + JDK-8226697: Several tests which need the @key headful\n keyword are missing it.\n + JDK-8229378: jdwp library loader in linker_md.c quietly\n truncates on buffer overflow\n + JDK-8230303: JDB hangs when running monitor command\n + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)\n return NULL if n is not in the CG\n + JDK-8234617: C1: Incorrect result of field load due to\n missing narrowing conversion\n + JDK-8235243: handle VS2017 15.9 and VS2019 in\n abstract_vm_version\n + JDK-8235325: build failure on Linux after 8235243\n + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink\n + JDK-8237951: CTW: C2 compilation fails with \u0027malformed\n control flow\u0027\n + JDK-8238225: Issues reported after replacing symlink at\n Contents/MacOS/libjli.dylib with binary\n + JDK-8239385: KerberosTicket client name refers wrongly to\n sAMAccountName in AD\n + JDK-8239819: XToolkit: Misread of screen information memory\n + JDK-8240295: hs_err elapsed time in seconds is not accurate\n enough\n + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system\n property with a security one\n + JDK-8242498: Invalid \u0027sun.awt.TimedWindowEvent\u0027 object leads\n to JVM crash\n + JDK-8243489: Thread CPU Load event may contain wrong data for\n CPU time under certain conditions\n + JDK-8244818: Java2D Queue Flusher crash while moving\n application window to external monitor\n + JDK-8246310: Clean commented-out code about ModuleEntry\n and PackageEntry in JFR\n + JDK-8246384: Enable JFR by default on supported architectures\n for October 2020 release\n + JDK-8248643: Remove extra leading space in JDK-8240295 8u\n backport\n + JDK-8249610: Make\n sun.security.krb5.Config.getBooleanObject(String... keys)\n method public\n * Import of OpenJDK 8 u272 build 02\n + JDK-8023697: failed class resolution reports different class\n name in detail message for the first and subsequent times\n + JDK-8025886: replace [[ and == bash extensions in regtest\n + JDK-8046274: Removing dependency on jakarta-regexp\n + JDK-8048933: -XX:+TraceExceptions output should include the\n message\n + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/\n /fileaccess/FontFile.java fails\n + JDK-8148854: Class names \u0027SomeClass\u0027 and \u0027LSomeClass;\u0027\n treated by JVM as an equivalent\n + JDK-8154313: Generated javadoc scattered all over the place\n + JDK-8163251: Hard coded loop limit prevents reading of smart\n card data greater than 8k\n + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java\n fails with compiler.whitebox.SimpleTestCaseHelper(int) must be\n compiled\n + JDK-8183349: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java\n + JDK-8191678: [TESTBUG] Add keyword headful in java/awt\n FocusTransitionTest test.\n + JDK-8201633: Problems with AES-GCM native acceleration\n + JDK-8211049: Second parameter of \u0027initialize\u0027 method is not\n used\n + JDK-8219566: JFR did not collect call stacks when\n MaxJavaStackTraceDepth is set to zero\n + JDK-8220165: Encryption using GCM results in\n RuntimeException- input length out of bound\n + JDK-8220555: JFR tool shows potentially misleading message\n when it cannot access a file\n + JDK-8224217: RecordingInfo should use textual representation\n of path\n + JDK-8231779: crash\n HeapWord*ParallelScavengeHeap::failed_mem_allocate\n + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c\n \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/\n /SctpNet.c \u0027multiple definition\u0027 link errors with GCC10\n + JDK-8238388, PR3798: libj2gss/NativeFunc.o \u0027multiple\n definition\u0027 link errors with GCC10\n + JDK-8242556: Cannot load RSASSA-PSS public key with non-null\n params from byte array\n + JDK-8250755: Better cleanup for jdk/test/javax/imageio/\n /plugins/shared/CanWriteSequence.java\n * Import of OpenJDK 8 u272 build 03\n + JDK-6574989: TEST_BUG:\n javax/sound/sampled/Clip/bug5070081.java fails sometimes\n + JDK-8148754: C2 loop unrolling fails due to unexpected graph\n shape\n + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests\n fail with error : revokeall.exe: Permission denied\n + JDK-8203357: Container Metrics\n + JDK-8209113: Use WeakReference for lastFontStrike for created\n Fonts\n + JDK-8216283: Allow shorter method sampling interval than 10 ms\n + JDK-8221569: JFR tool produces incorrect output when both\n --categories and --events are specified\n + JDK-8233097: Fontmetrics for large Fonts has zero width\n + JDK-8248851: CMS: Missing memory fences between free chunk\n check and klass read\n + JDK-8250875: Incorrect parameter type for update_number in\n JDK_Version::jdk_update\n * Import of OpenJDK 8 u272 build 04\n + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws\n IllegalArgumentException for flags of type double\n + JDK-8177334: Update xmldsig implementation to Apache\n Santuario 2.1.1\n + JDK-8217878: ENVELOPING XML signature no longer works in JDK\n 11\n + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR\n exception on OpenJDK 11, works 8/9/10\n + JDK-8243138: Enhance BaseLdapServer to support starttls\n extended request\n * Import of OpenJDK 8 u272 build 05\n + JDK-8026236: Add PrimeTest for BigInteger\n + JDK-8057003: Large reference arrays cause extremely long\n synchronization times\n + JDK-8060721: Test runtime/SharedArchiveFile/\n /LimitSharedSizes.java fails in jdk 9 fcs new\n platforms/compiler\n + JDK-8152077: (cal) Calendar.roll does not always roll the\n hours during daylight savings\n + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed\n + JDK-8211163: UNIX version of Java_java_io_Console_echo does\n not return a clean boolean\n + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in\n docker container only works with debug JVMs\n + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo\n + JDK-8236645: JDK 8u231 introduces a regression with\n incompatible handling of XML messages\n + JDK-8240676: Meet not symmetric failure when running lucene\n on jdk8\n + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA\n program\n + JDK-8249158: THREAD_START and THREAD_END event posted in\n primordial phase\n + JDK-8250627: Use -XX:+/-UseContainerSupport for\n enabling/disabling Java container metrics\n + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and\n Solaris builds\n + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:\n AgeTableTracer::is_tenuring_distribution_event_enabled\n * Import of OpenJDK 8 u272 build 06\n + JDK-8064319: Need to enable -XX:+TraceExceptions in release\n builds\n + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11\n v2.40 support\n + JDK-8160768: Add capability to custom resolve host/domain\n names within the default JNDI LDAP provider\n + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()\n not working\n + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface\n license\n + JDK-8184762: ZapStackSegments should use optimized memset\n + JDK-8193234: When using -Xcheck:jni an internally allocated\n buffer can leak\n + JDK-8219919: RuntimeStub name lost with\n PrintFrameConverterAssembly\n + JDK-8220313: [TESTBUG] Update base image for Docker testing\n to OL 7.6\n + JDK-8222079: Don\u0027t use memset to initialize fields decode_env\n constructor in disassembler.cpp\n + JDK-8225695: 32-bit build failures after JDK-8080462 (Update\n SunPKCS11 provider with PKCS11 v2.40 support)\n + JDK-8226575: OperatingSystemMXBean should be made container\n aware\n + JDK-8226809: Circular reference in printed stack trace is not\n correctly indented \u0026 ambiguous\n + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM\n + JDK-8233621: Mismatch in jsse.enableMFLNExtension property\n name\n + JDK-8238898, PR3801: Missing hash characters for header on\n license file\n + JDK-8243320: Add SSL root certificates to Oracle Root CA\n program\n + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest\n release 1.8.26\n + JDK-8245467: Remove 8u TLSv1.2 implementation files\n + JDK-8245469: Remove DTLS protocol implementation\n + JDK-8245470: Fix JDK8 compatibility issues\n + JDK-8245471: Revert JDK-8148188\n + JDK-8245472: Backport JDK-8038893 to JDK8\n + JDK-8245473: OCSP stapling support\n + JDK-8245474: Add TLS_KRB5 cipher suites support according to\n RFC-2712\n + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello\n message by default\n + JDK-8245477: Adjust TLS tests location\n + JDK-8245653: Remove 8u TLS tests\n + JDK-8245681: Add TLSv1.3 regression test from 11.0.7\n + JDK-8251117: Cannot check P11Key size in P11Cipher and\n P11AEADCipher\n + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is\n set to either true or false\n + JDK-8251341: Minimal Java specification change\n + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u\n * Import of OpenJDK 8 u272 build 07\n + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ\n * Import of OpenJDK 8 u272 build 08\n + JDK-8062947: Fix exception message to correctly represent\n LDAP connection failure\n + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed\n due to timeout on DeadServerNoTimeoutTest is incorrect\n + JDK-8252573: 8u: Windows build failed after 8222079 backport\n * Import of OpenJDK 8 u272 build 09\n + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :\n Compilation failed\n * Import of OpenJDK 8 u272 build 10\n + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed\n by the fix for JDK-8249158\n + JDK-8254937: Revert JDK-8148854 for 8u272\n * Backports\n + JDK-8038723, PR3806: Openup some PrinterJob tests\n + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when\n JTable contains certain string\n + JDK-8058779, PR3805: Faster implementation of\n String.replace(CharSequence, CharSequence)\n + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several\n client tests unaffected by the automated bulk update\n + JDK-8144015, PR3806: [PIT] failures of text layout font tests\n + JDK-8144023, PR3806: [PIT] failure of text measurements in\n javax/swing/text/html/parser/Parser/6836089/bug6836089.java\n + JDK-8144240, PR3806: [macosx][PIT] AIOOB in\n closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8145542, PR3806: The case failed automatically and thrown\n java.lang.ArrayIndexOutOfBoundsException exception\n + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when\n displaying Devanagari text in JEditorPane\n + JDK-8152358, PR3800: code and comment cleanups found during\n the hunt for 8077392\n + JDK-8152545, PR3804: Use preprocessor instead of compiling a\n program to generate native nio constants\n + JDK-8152680, PR3806: Regression in\n GlyphVector.getGlyphCharIndex behaviour\n + JDK-8158924, PR3806: Incorrect i18n text document layout\n + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for\n javax/swing/text/GlyphPainter2/6427244/bug6427244.java\n + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/\n /GetGlyphCharIndexTest.java does not compile\n + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/\n /GlyphPainter2/6427244/bug6427244.java - compilation failed\n + JDK-8191512, PR3806: T2K font rasterizer code removal\n + JDK-8191522, PR3806: Remove Bigelow\u0026Holmes Lucida fonts from\n JDK sources\n + JDK-8236512, PR3801: PKCS11 Connection closed after\n Cipher.doFinal and NoPadding\n + JDK-8254177, PR3809: (tz) Upgrade time-zone data to\n tzdata2020b\n * Bug fixes\n + PR3798: Fix format-overflow error on GCC 10, caused by\n passing NULL to a \u0027%s\u0027 directive\n + PR3795: ECDSAUtils for XML digital signatures should support\n the same curve set as the rest of the JDK\n + PR3799: Adapt elliptic curve patches to JDK-8245468: Add\n TLSv1.3 implementation classes from 11.0.7\n + PR3808: IcedTea does not install the JFR *.jfc files\n + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has\n fixed its use with Shenandoah\n + PR3811: Don\u0027t attempt to install JFR files when JFR is\n disabled\n * Shenandoah\n + [backport] 8221435: Shenandoah should not mark through weak\n roots\n + [backport] 8221629: Shenandoah: Cleanup class unloading logic\n + [backport] 8222992: Shenandoah: Pre-evacuate all roots\n + [backport] 8223215: Shenandoah: Support verifying subset of\n roots\n + [backport] 8223774: Shenandoah: Refactor\n ShenandoahRootProcessor and family\n + [backport] 8224210: Shenandoah: Refactor\n ShenandoahRootScanner to support scanning CSet codecache roots\n + [backport] 8224508: Shenandoah: Need to update thread roots\n in final mark for piggyback ref update cycle\n + [backport] 8224579: ResourceMark not declared in\n shenandoahRootProcessor.inline.hpp with\n --disable-precompiled-headers\n + [backport] 8224679: Shenandoah: Make\n ShenandoahParallelCodeCacheIterator noncopyable\n + [backport] 8224751: Shenandoah: Shenandoah Verifier should\n select proper roots according to current GC cycle\n + [backport] 8225014: Separate ShenandoahRootScanner method for\n object_iterate\n + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn\u0027t\n work for Shenandoah\n + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to\n ensure roots to-space invariant\n + [backport] 8225590: Shenandoah: Refactor\n ShenandoahClassLoaderDataRoots API\n + [backport] 8226413: Shenandoah: Separate root scanner for\n SH::object_iterate()\n + [backport] 8230853: Shenandoah: replace leftover\n assert(is_in(...)) with rich asserts\n + [backport] 8231198: Shenandoah: heap walking should visit all\n roots most of the time\n + [backport] 8231244: Shenandoah: all-roots heap walking misses\n some weak roots\n + [backport] 8237632: Shenandoah: accept NULL fwdptr to\n cooperate with JVMTI and JFR\n + [backport] 8239786: Shenandoah: print per-cycle statistics\n + [backport] 8239926: Shenandoah: Shenandoah needs to mark\n nmethod\u0027s metadata\n + [backport] 8240671: Shenandoah: refactor\n ShenandoahPhaseTimings\n + [backport] 8240749: Shenandoah: refactor ShenandoahUtils\n + [backport] 8240750: Shenandoah: remove leftover files and\n mentions of ShenandoahAllocTracker\n + [backport] 8240868: Shenandoah: remove CM-with-UR\n piggybacking cycles\n + [backport] 8240872: Shenandoah: Avoid updating new regions\n from start of evacuation\n + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers\n + [backport] 8240915: Shenandoah: Remove unused fields in init\n mark tasks\n + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects\n paths after JDK-8240868\n + [backport] 8241007: Shenandoah: remove\n ShenandoahCriticalControlThreadPriority support\n + [backport] 8241062: Shenandoah: rich asserts trigger \u0027empty\n statement\u0027 inspection\n + [backport] 8241081: Shenandoah: Do not modify\n update-watermark concurrently\n + [backport] 8241093: Shenandoah: editorial changes in flag\n descriptions\n + [backport] 8241139: Shenandoah: distribute mark-compact work\n exactly to minimize fragmentation\n + [backport] 8241142: Shenandoah: should not use parallel\n reference processing with single GC thread\n + [backport] 8241351: Shenandoah: fragmentation metrics overhaul\n + [backport] 8241435: Shenandoah: avoid disabling pacing with\n \u0027aggressive\u0027\n + [backport] 8241520: Shenandoah: simplify region sequence\n numbers handling\n + [backport] 8241534: Shenandoah: region status should include\n update watermark\n + [backport] 8241574: Shenandoah: remove\n ShenandoahAssertToSpaceClosure\n + [backport] 8241583: Shenandoah: turn heap lock asserts into\n macros\n + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not\n derive from ContiguousSpace\n + [backport] 8241673: Shenandoah: refactor anti-false-sharing\n padding\n + [backport] 8241675: Shenandoah: assert(n-\u003eoutcnt() \u003e 0) at\n shenandoahSupport.cpp:2858 with\n java/util/Collections/FindSubList.java\n + [backport] 8241692: Shenandoah: remove\n ShenandoahHeapRegion::_reserved\n + [backport] 8241700: Shenandoah: Fold\n ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier\n + [backport] 8241740: Shenandoah: remove\n ShenandoahHeapRegion::_heap\n + [backport] 8241743: Shenandoah: refactor and inline\n ShenandoahHeap::heap()\n + [backport] 8241748: Shenandoah: inline MarkingContext TAMS\n methods\n + [backport] 8241838: Shenandoah: no need to trash cset during\n final mark\n + [backport] 8241841: Shenandoah: ditch one of allocation type\n counters in ShenandoahHeapRegion\n + [backport] 8241842: Shenandoah: inline\n ShenandoahHeapRegion::region_number\n + [backport] 8241844: Shenandoah: rename\n ShenandoahHeapRegion::region_number\n + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions\n to cache lines\n + [backport] 8241926: Shenandoah: only print heap changes for\n operations that directly affect it\n + [backport] 8241983: Shenandoah: simplify FreeSet logging\n + [backport] 8241985: Shenandoah: simplify collectable garbage\n logging\n + [backport] 8242040: Shenandoah: print allocation failure type\n + [backport] 8242041: Shenandoah: adaptive heuristics should\n account evac reserve in free target\n + [backport] 8242042: Shenandoah: tune down\n ShenandoahGarbageThreshold\n + [backport] 8242054: Shenandoah: New incremental-update mode\n + [backport] 8242075: Shenandoah: rename\n ShenandoahHeapRegionSize flag\n + [backport] 8242082: Shenandoah: Purge Traversal mode\n + [backport] 8242083: Shenandoah: split \u0027Prepare Evacuation\u0027\n tracking into cset/freeset counters\n + [backport] 8242089: Shenandoah: per-worker stats should be\n summed up, not averaged\n + [backport] 8242101: Shenandoah: coalesce and parallelise heap\n region walks during the pauses\n + [backport] 8242114: Shenandoah: remove\n ShenandoahHeapRegion::reset_alloc_metadata_to_shared\n + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier\n dispatching\n + [backport] 8242211: Shenandoah: remove\n ShenandoahHeuristics::RegionData::_seqnum_last_alloc\n + [backport] 8242212: Shenandoah: initialize\n ShenandoahHeuristics::_region_data eagerly\n + [backport] 8242213: Shenandoah: remove\n ShenandoahHeuristics::_bytes_in_cset\n + [backport] 8242217: Shenandoah: Enable GC mode to be\n diagnostic/experimental and have a name\n + [backport] 8242227: Shenandoah: transit regions to cset state\n when adding to collection set\n + [backport] 8242228: Shenandoah: remove unused\n ShenandoahCollectionSet methods\n + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion\n liveness-related methods\n + [backport] 8242267: Shenandoah: regions space needs to be\n aligned by os::vm_allocation_granularity()\n + [backport] 8242271: Shenandoah: add test to verify GC mode\n unlock\n + [backport] 8242273: Shenandoah: accept either SATB or IU\n barriers, but not both\n + [backport] 8242301: Shenandoah: Inline LRB runtime call\n + [backport] 8242316: Shenandoah: Turn NULL-check into assert\n in SATB slow-path entry\n + [backport] 8242353: Shenandoah: micro-optimize region\n liveness handling\n + [backport] 8242365: Shenandoah: use uint16_t instead of\n jushort for liveness cache\n + [backport] 8242375: Shenandoah: Remove\n ShenandoahHeuristic::record_gc_start/end methods\n + [backport] 8242641: Shenandoah: clear live data and update\n TAMS optimistically\n + [backport] 8243238: Shenandoah: explicit GC request should\n wait for a complete GC cycle\n + [backport] 8243301: Shenandoah: ditch\n ShenandoahAllowMixedAllocs\n + [backport] 8243307: Shenandoah: remove\n ShCollectionSet::live_data\n + [backport] 8243395: Shenandoah: demote guarantee in\n ShenandoahPhaseTimings::record_workers_end\n + [backport] 8243463: Shenandoah: ditch total_pause counters\n + [backport] 8243464: Shenandoah: print statistic counters in\n time order\n + [backport] 8243465: Shenandoah: ditch unused pause_other,\n conc_other counters\n + [backport] 8243487: Shenandoah: make _num_phases illegal\n phase type\n + [backport] 8243494: Shenandoah: set counters once per cycle\n + [backport] 8243573: Shenandoah: rename GCParPhases and\n related code\n + [backport] 8243848: Shenandoah: Windows build fails after\n JDK-8239786\n + [backport] 8244180: Shenandoah: carry Phase to\n ShWorkerTimingsTracker explicitly\n + [backport] 8244200: Shenandoah: build breakages after\n JDK-8241743\n + [backport] 8244226: Shenandoah: per-cycle statistics contain\n worker data from previous cycles\n + [backport] 8244326: Shenandoah: global statistics should not\n accept bogus samples\n + [backport] 8244509: Shenandoah: refactor\n ShenandoahBarrierC2Support::test_* methods\n + [backport] 8244551: Shenandoah: Fix racy update of\n update_watermark\n + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state\n takes loop for wrong control\n + [backport] 8244730: Shenandoah: gc/shenandoah/options/\n /TestHeuristicsUnlock.java should only verify the heuristics\n + [backport] 8244732: Shenandoah: move heuristics code to\n gc/shenandoah/heuristics\n + [backport] 8244737: Shenandoah: move mode code to\n gc/shenandoah/mode\n + [backport] 8244739: Shenandoah: break superclass dependency\n on ShenandoahNormalMode\n + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode\n to ShenandoahSATBMode\n + [backport] 8245461: Shenandoah: refine mode name()-s\n + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings\n constructor arguments\n + [backport] 8245464: Shenandoah: allocate collection set\n bitmap at lower addresses\n + [backport] 8245465: Shenandoah: test_in_cset can use more\n efficient encoding\n + [backport] 8245726: Shenandoah: lift/cleanup\n ShenandoahHeuristics names and properties\n + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch\n + [backport] 8245757: Shenandoah: AlwaysPreTouch should not\n disable heap resizing or uncommits\n + [backport] 8245773: Shenandoah: Windows assertion failure\n after JDK-8245464\n + [backport] 8245812: Shenandoah: compute root phase parallelism\n + [backport] 8245814: Shenandoah: reconsider format specifiers\n for stats\n + [backport] 8245825: Shenandoah: Remove diagnostic flag\n ShenandoahConcurrentScanCodeRoots\n + [backport] 8246162: Shenandoah: full GC does not mark code\n roots when class unloading is off\n + [backport] 8247310: Shenandoah: pacer should not affect\n interrupt status\n + [backport] 8247358: Shenandoah: reconsider free budget slice\n for marking\n + [backport] 8247367: Shenandoah: pacer should wait on lock\n instead of exponential backoff\n + [backport] 8247474: Shenandoah: Windows build warning after\n JDK-8247310\n + [backport] 8247560: Shenandoah: heap iteration holds root\n locks all the time\n + [backport] 8247593: Shenandoah: should not block pacing\n reporters\n + [backport] 8247751: Shenandoah: options tests should run with\n smaller heaps\n + [backport] 8247754: Shenandoah: mxbeans tests can be shorter\n + [backport] 8247757: Shenandoah: split heavy tests by\n heuristics to improve parallelism\n + [backport] 8247860: Shenandoah: add update watermark line in\n rich assert failure message\n + [backport] 8248041: Shenandoah: pre-Full GC root updates may\n miss some roots\n + [backport] 8248652: Shenandoah: SATB buffer handling may\n assume no forwarded objects\n + [backport] 8249560: Shenandoah: Fix racy GC request handling\n + [backport] 8249649: Shenandoah: provide per-cycle pacing stats\n + [backport] 8249801: Shenandoah: Clear soft-refs on requested\n GC cycle\n + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests\n should account for corner cases\n + Fix slowdebug build after JDK-8230853 backport\n + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for\n x86_32 and JFR\n + JDK-8252366: Shenandoah: revert/cleanup changes in\n graphKit.cpp\n + Shenandoah: add JFR roots to root processor after JFR\n integration\n + Shenandoah: add root statistics for string dedup table/queues\n + Shenandoah: enable low-frequency STW class unloading\n + Shenandoah: fix build failures after JDK-8244737 backport\n + Shenandoah: Fix build failure with +JFR -PCH\n + Shenandoah: fix forceful pacer claim\n + Shenandoah: fix formats in\n ShenandoahStringSymbolTableUnlinkTask\n + Shenandoah: fix runtime linking failure due to non-compiled\n shenandoahBarrierSetC1\n + Shenandoah: hook statistics printing to PrintGCDetails, not\n PrintGC\n + Shenandoah: JNI weak roots are always cleared before Full GC\n mark\n + Shenandoah: missing SystemDictionary roots in\n ShenandoahHeapIterationRootScanner\n + Shenandoah: move barrier sets to their proper locations\n + Shenandoah: move parallelCleaning.* to shenandoah/\n + Shenandoah: pacer should use proper Atomics for intptr_t\n + Shenandoah: properly deallocates class loader metadata\n + Shenandoah: specialize String Table scans for better pause\n performance\n + Shenandoah: Zero build fails after recent Atomic cleanup in\n Pacer\n * AArch64 port\n + JDK-8161072, PR3797: AArch64: jtreg\n compiler/uncommontrap/TestDeoptOOM failure\n + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java\n generates guarantee failure in C1\n + JDK-8183925, PR3797: [AArch64] Decouple crash protection from\n watcher thread\n + JDK-8199712, PR3797: [AArch64] Flight Recorder\n + JDK-8203481, PR3797: Incorrect constraint for unextended_sp\n in frame:safe_for_sender\n + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall\n fails with SIGILL on aarch64\n + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command\n + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java\n fails on AArch64\n + JDK-8216989, PR3797:\n CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()\n does not check for zero length on AARCH64\n + JDK-8217368, PR3797: AArch64: C2 recursive stack locking\n optimisation not triggered\n + JDK-8221658, PR3797: aarch64: add necessary predicate for\n ubfx patterns\n + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a\n BufferBlob\n + JDK-8246482, PR3797: Build failures with +JFR -PCH\n + JDK-8247979, PR3797: aarch64: missing side effect of killing\n flags for clearArray_reg_reg\n + JDK-8248219, PR3797: aarch64: missing memory barrier in\n fast_storefield and fast_accessfield\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-2048", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2048-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:2048-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:2048-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" }, { "category": "self", "summary": "SUSE Bug 1174157", "url": "https://bugzilla.suse.com/1174157" }, { "category": "self", "summary": "SUSE Bug 1177943", "url": "https://bugzilla.suse.com/1177943" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2020-11-26T17:27:14Z", "generator": { "date": "2020-11-26T17:27:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:2048-1", "initial_release_date": "2020-11-26T17:27:14Z", "revision_history": [ { "date": "2020-11-26T17:27:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-accessibility-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-demo-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-devel-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-headless-1.8.0.272-lp151.2.15.1.x86_64", "openSUSE Leap 15.1:java-1_8_0-openjdk-javadoc-1.8.0.272-lp151.2.15.1.noarch", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.i586", "openSUSE Leap 15.1:java-1_8_0-openjdk-src-1.8.0.272-lp151.2.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-11-26T17:27:14Z", "details": "moderate" } ], "title": "CVE-2020-14803" } ] }
gsd-2020-14798
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-14798", "description": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "id": "GSD-2020-14798", "references": [ "https://www.suse.com/security/cve/CVE-2020-14798.html", "https://www.debian.org/security/2020/dsa-4779", "https://ubuntu.com/security/CVE-2020-14798" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-14798" ], "details": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "id": "GSD-2020-14798", "modified": "2023-12-13T01:21:59.912537Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2020-14798", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Java SE JDK and JRE", "version": { "version_data": [ { "version_affected": "=", "version_value": "Java SE: 7u271" }, { "version_affected": "=", "version_value": "8u261" }, { "version_affected": "=", "version_value": "11.0.8" }, { "version_affected": "=", "version_value": "15; Java SE Embedded: 8u261" } ] } } ] }, "vendor_name": "Oracle Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)." } ] }, "impact": { "cvss": { "baseScore": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data." } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20201023-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "name": "DSA-4779", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4779" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "name": "openSUSE-SU-2020:1893", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "name": "GLSA-202101-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202101-19" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jdk:11.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update271:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.8.0:update261:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.8.0:update261:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:santricity_cloud_connector:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionStartIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "versionStartIncluding": "9.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.60.1", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2020-14798" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20201023-0004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201023-0004/" }, { "name": "DSA-4779", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4779" }, { "name": "[debian-lts-announce] 20201030 [SECURITY] [DLA 2412-1] openjdk-8 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "name": "openSUSE-SU-2020:1893", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" }, { "name": "GLSA-202101-19", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202101-19" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4 } }, "lastModifiedDate": "2022-05-13T14:57Z", "publishedDate": "2020-10-21T15:15Z" } } }
ghsa-xc9p-gjc5-8c5x
Vulnerability from github
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
{ "affected": [], "aliases": [ "CVE-2020-14798" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-10-21T15:15:00Z", "severity": "LOW" }, "details": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "id": "GHSA-xc9p-gjc5-8c5x", "modified": "2025-05-27T18:30:35Z", "published": "2022-05-24T17:31:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14798" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202101-19" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20201023-0004" }, { "type": "WEB", "url": "https://www.debian.org/security/2020/dsa-4779" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.